1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
11

Which one is not an operating system?1.mac 2.Microsoft office3.Iso.3.Android

Computers and Technology
1 answer:
quester [9]3 years ago
6 0
It's either microsoft or office. Based on research I would say office.

I really hope this helps you! :-)
You might be interested in
Eight houses represented as cells are arranged in a straight line java int state []
monitta

Answer:

int state[] = new int[8];

8 0
3 years ago
Which of these definitions BEST explains what plagiarism is:
Alex777 [14]
To use another person's work without crediting the source.
6 0
3 years ago
Read 2 more answers
The ip address 221.1.10.53 /24 is a what type of address?
jekas [21]
It is a class C address.  Class C covers all addresses in the range 192.0.0.0 to 223.0.0.0.  The /24 represents the number of network bits in the address so we can work out that the subnet mask of this address would be 255.255.255.0.
8 0
3 years ago
to create a cover letter to send to a potential employers along with a resume what software program should you use
tigry1 [53]
Using Word would be correct.
7 0
3 years ago
Suppose that the content of the input file is: 14 13 26 8 -11 36 0 -1. What is the output of the following code? ifstream myInfi
tester [92]
I do not know, i really hope you dont fail!!!!!!!!!
3 0
3 years ago
Read 2 more answers
Other questions:
  • Is there such a thing as an ethical reason for unauthorized access into a computer system?
    15·1 answer
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • What function would you use to find the mean in a Microsoft excel document ?
    6·2 answers
  • In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
    12·1 answer
  • Is technology a legal discipline or law is a technological artifact.
    6·1 answer
  • You're doing desktop support and the company policy is that you can only help with company equipment. A user walks in:
    6·1 answer
  • Compare and contrast hardware and software.
    11·2 answers
  • After Daniel performed poorly on a test, his teacher advised him to do some self-reflection to figure out how he could get a bet
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!