1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
3 years ago
8

An operating system coordinations the___ of a computers operation

Computers and Technology
1 answer:
qwelly [4]3 years ago
8 0
\\\\\\\\\\\\\\\\\\\\\\\\\Operating system///////////////////////
                            Is the Answer
You might be interested in
What are types of computer viruses
NemiM [27]

Answer:

Resident Virus. Resident viruses set up shop in your RAM and meddle with your system operations. ...

Multipartite Virus. This virus infects the entire system. ...

Direct Action. ...

Browser Hijacker. ...

Overwrite Virus. ...

Web Scripting Virus. ...

File Infector. ...

Network Virus

Explanation:

6 0
3 years ago
Read 2 more answers
When you enable user access control (uac)
SVEN [57.7K]
The UAC is on by default. So, you don't need to turn it on unless someone else turned it off.

The UAC has four modes.

The lowest mode is the off position. If the UAC is off, no UAC prompt will pop up when doing administrative tasks.

6 0
3 years ago
What effect can camera tilt create? Do you think this is effective? Why or why not?
Naily [24]
<span>Camera tilt can help you capture more of your subject in vertical terms, this can be effective when you do portraits, but sometimes ineffective when doing landscape.

Hope this helps!</span>
7 0
3 years ago
Read 2 more answers
A cell has an unlimited number of conditions for Conditional Formatting.<br> A.true<br> B.false
Mekhanik [1.2K]
I believe the answer is false.
I Hope this helps! :)
If you don't understand plz message me
If you do plz brainlest
Thank you!
7 0
3 years ago
Implementing content filtering and intrusion detection/intrusion prevention systems at the Internet ingress/egress as well as di
olya-2409 [2.1K]

the correct answer is:

d. clicking on unknown e-mail attachment and files.

5 0
3 years ago
Other questions:
  • What does the dashed line in the beaker separating the two sides represent?______________________?
    13·2 answers
  • Why is it important to begin development of a software solution with a programming design in place? A programming design summari
    6·1 answer
  • Which type of view is created from the following SQL statement? CREATE VIEW balancedue AS SELECT customer#, order#, SUM(quantity
    15·1 answer
  • Why can black holes not be seen?
    5·1 answer
  • To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
    10·1 answer
  • Which of the following best describes when a packet is addressed so that more than one destination can receive it and the first
    11·1 answer
  • There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
    8·1 answer
  • Explain the procedure you will undertake to create a new partition​
    11·1 answer
  • X333: countElements Given an array of integers and an integer target, return a count of the number of times the target value occ
    6·1 answer
  • Irene is creating a wireframe of a website she is working on to show her client. In which phase of the development process is sh
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!