1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
5

Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns

the computer’s resources, such as devices, programs, apps, data, and information?
Computers and Technology
1 answer:
bagirrra123 [75]3 years ago
4 0
The answer is the Kernel.
In computing, the Kernel's job is to manage the I/O requests from the software on your computer and converts them into data processing instructions for the CPU (Central Processing Unit) and the rest of the electronic components of a computer.
 
You might be interested in
email communication has its own set of etiquette guildelines for users to follow if they want to be effectove communicators. whi
Len [333]
Effective not effectove. These are guidelines:
Be brief.
Have a short opening sentence or paragraph that puts the matter in context.
Use the middle paragraph(s) to cover the matter(s) in hand.
Close with a clear agreement of what will be done, by whom, and by when.
7 0
3 years ago
A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer
svlad2 [7]

Answer:

Virtual Machine

Explanation:

<em> I had to look this up, since there were no options from the question. If this is wrong, let me know!</em>

8 0
2 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
How does ur computer know that its cursor moved
Anton [14]
The sensor of a mouse connected to the computer or the touch pad being touched and swiped around on
8 0
3 years ago
Read 2 more answers
Which sentence is true about artificial neural networks
kirill [66]

Answer:

Oct 30, 2018 — ... design? A) difficulty level B) level duration C) perspective D) player-adjusted time. ... Add answer+5 pts. Log in to add comment. jonathanwilson is waiting for your help. Add your answer and earn points. ... New questions in Computer Science. answer ... classified the computer on the basic of operations​.Explanation:

8 0
3 years ago
Other questions:
  • What are the three fundamental elements of an effective security program for information systems?
    11·2 answers
  • Your friend sends you a computer game. after installing the game on your computer, you realize that it plays very slowly. you kn
    14·1 answer
  • Scientific models can be used for a variety of different purposes. Which of the following statements about scientific models is
    7·2 answers
  • __________ involves determining what qualities are to beused to perform project activities.
    9·1 answer
  • Which element appears within the top margin of the document but does not form the part of the body of the text?
    15·1 answer
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • ¿Qué diferencia existe entre un virus biológico y virus informático?
    12·1 answer
  • What does it mean "Be Proactive"?
    10·2 answers
  • In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested cond
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!