1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
15

What tasks do most operating systems perform?

Computers and Technology
1 answer:
umka2103 [35]3 years ago
8 0

Answer:

The most operating system perform these task that can be given as:

Allocating RAM to open programs.

Creating and maintaining the FAT .

Coordinating the interaction between hardware and software.

Displaying the GUI .

Explanation:

The description of these task as follows:

  • Allocating ram to open program: RAM stands for Random Access Memory in the operating system when we on the computer system so the operating system first load some file that use the ram because it is volatile memory. It works when the system is on.
  • Creating and maintaining the FAT : FAT stands for File Allocation Table. This file stored in the hard drive that usually support 12 or 16-bit cluster for insert data into FAT. This file is only used by the operating system for creating and manages files.
  • An operating system works as an interface between computer hardware and the user. It is a System software that coordinates between hardware and software.
  • Displaying the GUI: The term GUI stands for graphical user interface. It is a feature of operating systems that provide the GUI mode. In this mode, the user can understand things more easily.
You might be interested in
A line of text that has an equal number of characters on either side of the horizontal center of the page is called____.
VLD [36.1K]
A) force justified.

If you open up Word (or probably any word processor) and hover over the alignment options in the ribbon (or format the paragraph), it tells you what each one is, and the option that ensures the characters are spread evenly between the margins is labeled "justified."
6 0
3 years ago
Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be,
dolphi86 [110]

Answer:

Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.

Explanation:

please mark this answer as brainliest

7 0
3 years ago
What do TCP/IP MEAN​
melomori [17]

Answer:IP is internet protocol, every router has one some routers are dynamic which means they change everything the router reboots and some routers are static which means you would have to call your isp(Internet Service Provider) to get it changed.

Explanation: I do illegal things :)

8 0
3 years ago
Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
Nataly [62]

Answer:

The code is not dereferencing the pointers. You have to place an asterisk in front of the pointer to read the value the pointer points to.

Explanation:

So "if (str1 != str2)" must be "if (*str1 != *str2)".

likewise:

   while (*str1 != 0 && *str2 != 0)

and

     result = (*str1 == *str2);

7 0
3 years ago
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
Inessa [10]

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

3 0
3 years ago
Other questions:
  • An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to
    5·1 answer
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integer
    14·2 answers
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • Which key must you press after you write into a cell?
    12·1 answer
  • Which of the following jobs is considered part of the information technology industry?
    15·2 answers
  • The movement of the economy through highs and lows is referred to as:
    11·1 answer
  • Enna always says thank you when people give her gifts. She even writes thank-you cards. On holidays, Enna remembers
    9·1 answer
  • Whats the correct answer
    15·2 answers
  • Iciples UI
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!