1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
14

Which of the following is not an operating system?

Computers and Technology
2 answers:
kykrilka [37]3 years ago
8 0
<span>D: Internet Explorer</span>
sergij07 [2.7K]3 years ago
4 0
Internet explorer is a web browser
You might be interested in
Fallon is a new student on campus. Everywhere she goes, she is asked for her 12-digit student number. To memorize her new studen
makvit [3.9K]

Answer:

chunking

Explanation:

Chunking refers to an approach for making more efficient use of short-term memory by grouping information. Chunking breaks up long strings of information into units or chunks. The resulting chunks are easier to commit to memory than a longer uninterrupted string of information.

8 0
3 years ago
A _______ chart compares differences in values by showing vertical bars sized relative to the values in the data series. A. line
Nostrana [21]
The answer is B, bar graph. Hope I helped! :D
7 0
3 years ago
Read 2 more answers
Many of the internal OS services are provided by the ___________ module, which contains the most important operating system proc
patriot [66]

Answer:

Kernal module

Explanation:

Modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system.

6 0
4 years ago
What type of selection can be used in leu of switch/case?
tankabanditka [31]
An if or else statement can be
7 0
3 years ago
Read 2 more answers
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Other questions:
  • Suppose that, in addition to edge capacities, a flow network has vertex capacities. That is each vertex vv has a limit l(v)l(v)
    7·1 answer
  • What is the main function of the motherboard?
    12·1 answer
  • Charlie is a British national who works in the United States as a novelist for children. Because he is British, he types the wor
    10·2 answers
  • What are some objects in your home that demonstrate electrical energy to radiant energy to thermal energy
    10·2 answers
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the pa
    9·2 answers
  • The part of a door frame that comes in contact with the door is the _________.
    12·1 answer
  • What is the Purpose and function of the Global Positioning System (GPS)?
    7·1 answer
  • "Businesses around the world all need access to the same data, so there needs to be one type of information system that is desig
    13·1 answer
  • Dash transfers several bits of data together at one time<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!