1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
4 years ago
6

Describe three general methods for passing parameters to the operating system.

Computers and Technology
1 answer:
const2013 [10]4 years ago
8 0

a. Pass parameters in registers

b. Registers pass starting addresses of blocks of parameters

c. Parameters can be placed, or pushed, onto the stack by the program,  and popped off the stack by the operating system

You might be interested in
The while loop is a pre-test loop? TRUE OR FALSE
mihalych1998 [28]
True

Hope I helped! 

Let me know if you need anything else!

~ Zoe
5 0
4 years ago
Read 2 more answers
_____ is a scam in which access to one's own computer is locked or restricted in some way.
gtnhenbr [62]
Ransomware is the answer to this.
5 0
3 years ago
A slide can have which of the following?
Margarita [4]

Answer:

D all of them mofos

Explanation:

7 0
3 years ago
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead a
Lesechka [4]

Answer:

Request the colleague to call after sometime

Explanation:

While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should be done is to "Request the colleague to call after some time."

This is because,e in situations like that, it is believed that the customer should come first, and that is the purpose of being there. For employee to serve the customer. A colleague can easily link up with other employees to get his issues sorted, or simply wait.

4 0
3 years ago
I am not a living being, I am a cylindrical shape that has three to eight sides. I never die. I can build anything again. What i
Setler79 [48]

Answer:

A shape

Explanation:

4 0
3 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • Define a function below, get_subset, which takes two arguments: a dictionary of strings (keys) to integers (values) and a list o
    8·1 answer
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • Peter wants to protect a confidential document by using a password. He wants to use an asterisk and an ampersand symbol in his p
    10·1 answer
  • John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows his to access
    5·1 answer
  • Dave has to create animations for a game. Which tool can Dave use?
    6·1 answer
  • Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called:
    8·2 answers
  • Haya would like to complemely delete Slide 11 from her presentation so that slides 12–16 become slides 11-15. What is
    9·1 answer
  • Many companies ban or restrict the use of flash drives
    11·1 answer
  • The color in a circle is a _____________ data type.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!