1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alisiya [41]
3 years ago
11

The most prominent type of system software, the ________, coordinates the interaction between hardware components, peripherals,

application software, and users.
Computers and Technology
1 answer:
Romashka [77]3 years ago
4 0

Answer:

The answer is "OS"

Explanation:

There is some information missing in the given question, that is the query choice, which can be summarized as follows:

A) OS

B) Random Access Memory (RAM)

C) Read-Only Memory (ROM)

D) point to point protocol

The Operating System is also known as a System software, that works as an interface between software and hardware devices. In these types of system software the basic resources first boots then the work is done by the machine needs, and certain alternatives were wrong, that can be described as follows:

  • RAM is a primary memory, which boots the OS.
  • ROM is a secondary memory, that's stores OS calculation data.
  • It is used in the Networking, that's why it's wrong  

You might be interested in
Write a program that prompts the user to enter positive integers (as many as the user enters) from standard input and prints out
julia-pushkina [17]

Answer:

Here is the JAVA program that prompts the user to enter positive integers from standard input and prints out the maximum and minimum values:

import java.util.*;

public class Ex0603 {

   public static void main(String[] args) { //start of main function

   Scanner in = new Scanner(System.in); //creates Scanner class object to take input from user

   int minimum = 0; //stores the minimum of the integers

   int maximum = 0; //stores the minimum of the integers

   int num; //stores the positive integer values

   System.out.println("enter a positive integer: ");//prompts user to enter a positive integer

   num = in.nextInt();//scans and reads the input integer value from user

   minimum = num;  //assigns value of num to minimum

   while(true) {//while loop keeps prompting user to enter a positive integer

       System.out.println("enter a positive integer: ");//prompts user to enter a positive integer

       num = in.nextInt();//scans and reads the input integer value from user

       if(num <=0)//if the user inputs a negative integer or 0

           break; //breaks the loop

       if (num > maximum) {//if the value of positive integer is greater than the maximum of value

           maximum = num; } //assigns that maximum value of num to maximum variable

       if (num < minimum) {//if the value of positive integer is less than the minimum of value

           minimum = num; //assigns that minimum value of num to minimum       }    }            

   System.out.println("The maximum integer is : " + maximum); //displays the maximum of the positive integers

   System.out.println("The minimum integer is : " + minimum); }}   //displays the minimum of the positive integers

Explanation:

Here is the JAVA program that that prompts the user to enter an integer N, then reads N double values, and prints their mean (average value) and sample standard deviation:

import java.util.*;  

public class Ex0603 {  

public static void main(String[] args) { //start of main function

Scanner in = new Scanner(System.in);  //creates Scanner class object to take input from user

double integer= 0;  //to store the number of input values

double sum = 0;  //to store the sum of input numbers

double mean = 0;  //to store the average of numbers

double sd = 0;  //to store the standard deviation result

double variance = 0;  //to store the variance result

double sumSquare = 0;  //to store the sum of (num-mean)^2

int n = 0;  //to store the sample size N

   System.out.println("Enter an integer: ");  //prompts user to enter an integer that is how many elements user wants to input

   integer = in.nextInt();  //reads the value of integer from user

   double size=integer; // declares a double type variable and assigns value of int type variable integer to this double type variable size

   int i=0;  //used to point each element of the num array

   double num[] = new double[(int)size];  //declares an array to hold the numbers input by user

   while(integer>0){  //loop executes until value of integer is greater than 0

   System.out.println("Enter a number: "); // prompts to enter a number

   num[i] = in.nextDouble(); //reads double values

   sum += num[i];  //adds the values stored in num array

   i++;  //increments i to point to the next element in num array

   n++;  //increments n to count the total number of elements

  integer--; //decrements integer value at each iteration

   mean = sum / n;    }  //compute the average of values

   i=0;  

    while(size>0){  //loop executes until value of size exceeds 0

       sumSquare += Math.pow(num[i]-mean,2); //takes the sum of square difference between each element of num array and value of mean

       i++; //increments i

      size--;   }  //decrements size

variance = sumSquare / (n-1);  //compute variance by dividing the result of sum of the squares of their differences from the mean by n-1

   sd = Math.sqrt(variance);  //computes standard deviation by using sqrt function which takes the sqrt of the result of variance computed above

System.out.println("Average value is: " + mean+ " and the standard deviation is " + String. format("%.2f", sd));   }} //displays the average of numbers stored in mean variable and value of standard deviation is displayed up to 2 decimal places

Screenshots of both programs and their outputs is attached.

7 0
3 years ago
\what security countermeasures can you enable on your wireless access point (wap) as part of a layered security solution for wla
dmitriy555 [2]
The security countermeasure that one can enable on a wireless access point as part of the layered solution for WLAN implementations would be to disable 802.1x . It is the one that provides a WEP and is very unsecure. Another is to change the SSID and to set the broadcast of the SSID to off.
5 0
4 years ago
True or false? risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems
TEA [102]
Risk assessment should cover all the processes and systems included in an organization. This means this includes also the technical support including <span>firewalls, secure operating systems and networks, and antivirus protection. Risk is always present and inevitable in every way so it is important to anticipate and make early detections to counter with actions as soon as one can.</span>
5 0
3 years ago
(Will mark brainiest) The ultimate goal of a distributed denial of service attack is to:
Mumz [18]

Answer: B

Explanation: They are trying to flood the service with so many things like messages, connection requests, that the system can't handle it and will shut down or crash.

5 0
3 years ago
Read 2 more answers
Which example is the best demonstration of initiative?
alisha [4.7K]

Answer: In this context, the best answer for the given questions would be (B) you offer to take on some extra work when a coworker is out sick.

Explanation: Initiative is pretty much defined as an action that is taken independently by someone. It could be said that one person with an initiative does not need someone else to tell him/her to do something.

4 0
3 years ago
Other questions:
  • Create a function that will perform linear interpolation from a set of measured data stored in a list or array. The function sho
    13·1 answer
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • If the motherboard is not getting power, it will not start the boot. ... A four-year old laptop will not boot and presents error
    13·1 answer
  • 3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s
    11·1 answer
  • The accounting department moved its network-attached printer from one side of the office to a more centralized location, making
    11·1 answer
  • Gap junctions and plasmodesmata have what feature in common?
    6·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    7·1 answer
  • Es el conjunto de manifestaciones materiales, intelectuales y espirituales que distinguen a un pueblo a)Civilización b)Cultura c
    6·1 answer
  • 30 POINTS FOR THE CORRECT ANSWER
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!