1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
11

as the reader, you can figure out the writer's ____ based on his or her word choice and sentence structure a. purpose b. audienc

e c. tone d.structure
Computers and Technology
1 answer:
Misha Larkins [42]3 years ago
8 0

Answer:

my choice purpose

Explanation:

the writer simply writes with a purpose to make his audience understand it's with the purpose that he writes

You might be interested in
The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
DaniilM [7]

Answer:

<em>The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems. </em>

Read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

  • Operating systems fundamentals

An operating system is the fundamental software which is needed to run a hardware every electronic hardware need an instruction set to make the hardware working. We can say that operating system is communication medium between the user as well other software to the hardware. Hardware don’t know the language of user and user don’t know the language of hardware how to give instructions to the hardware to perform some specific task so Operating system do this functionality to meet the needs of both user and hardware.

  •  The applications of the OS

Applications of operating system are following  

  • Security

Operating system make sure that all the user data is secured and an unauthorize source cannot access the computer to make any changes in user data or any other program.

  • Communication b/w application software and user

The other application of operating system is that it provides a communication channel b/w user and other application program by using some sort of compilers, interpreter to meet the user needs.  

  • File Management

Operating system also provide an essential feature of managing files. It provides complete directory and easy navigation of files and their usage access. It keeps track that where the information is stored and all other details that thing is known as file system.

  • Device Management  

Operating system also keep track of all the devices connected to it install their respective device drivers if available and make them available. OS do communication with the devices connected to it and then perform instructions via hardware and allocate which instruction set should be assign to which device.

  • Processor Management

OS control the multitasking feature of the processor. It makes an order of list of all the tasks which need to be done on processor and assign them according to there priority and also manage for how much time that task is assigned to the processor.

  • Error Detecting

OS keep track of all the information of the health of the computer and detect errors if available to avoid malfunctioning of the computer.

  • The Embedded OS

Embedded operating system are specially designed operating system which are used to for special purpose hardware/embedded system. These OS are more efficient than the simple OS and have limited features. They are designed to be compact and resource efficient. It perform real time operations and very responsive to the instructions. In our daily life ATM machine have an embedded OS, smart phones also have and in medical like MRI machine.  

  • Information system architecture

The information system is defined as formal definition of the business processes, product technologies and working system structure and other technical framework for a business organization. Information system architecture have four layers “Business Process Architecture”, “System Architecture”, “Technical Architecture” and “Product Architecture”.

Information system architecture consist of the software and hardware used to meet the consumer needs. It consists of a documented detail of software hardware used and networked and future plan to add some other features if needed to upgrade or change the system.

  • Cloud computing

Cloud computing is defined as on demand availability of computer resources over the network/internet like storage, software or processing without using the current system all the work is done on a system far away which is available on internet and can be accessed from anywhere. For such services there are data centers which store data on servers to make them available to there user.  

Cloud computing have some types like SaaS (Software as service), Storage, Database, Security, Platform as service.

4 0
3 years ago
The emergence of MP3 (iPod) technology is an example of creative destruction because a. It is less expensive than compact discs
Katen [24]

Answer:

The emergence of MP3 (iPod) technology is an example of creative destruction because it has b. Replaced compact discs as a technology used for the storage and transfer of music.

Explanation:

Creative destruction refers to the process whereby a new technology/product replaces the one before it. The MP3 technology replaced compact discs because people started using MP3 files to transfer and store music since it was less expensive and files could be transferred easily. MP3 files could be transferred over Bluetooth and they required less storage space. Whereas, a compact disc required more space and costed more as well. So, MP3 technology replaced compact discs.

The emergence of MP3 (iPod) technology is an example of creative destruction because it has b. Replaced compact discs as a technology used for the storage and transfer of music.

8 0
3 years ago
If the Account Number field in a record always should display the three characters in the account number in uppercase, then the
Mice21 [21]

Answer:

The correct answer is (>).

Explanation:

The greater-than sign (>) is the accurate format for the Account number field which is used to show the three characters in a data in uppercase of the account number. The Greater-than sign is always used to compare the data of the record, the comparison is done between the two columns or two number or another type of data.

8 0
3 years ago
What is one difference between IDLE and Eclipse?
Stells [14]

Answer:

IDLE is a language-specific IDE, while Eclipse is a multi-language IDE.

Explanation:

IDE or integrated development environment, are programs developed to allow programmers to Code, IDLE is specific software to code in python, has tools to make it easier and to personalize it to your python needs. Eclipse is software with open source that can be used with multiple languages basically Eclipse is a kind of IDE, while IDLE is a specific IDE for python.

5 0
3 years ago
Read 2 more answers
What is the meaning of N.W.O​
Likurg_2 [28]

Answer:

The New World Order (NWO) in conspiracy theories is the hypothesis of a secretly emerging totalitarian world government.

8 0
3 years ago
Other questions:
  • What is a society that has moved to the internet Rather than relying on physical media called
    11·1 answer
  • You must obey any special signs or instructions as you pass a construction zone.
    14·2 answers
  • Select the organizational skills that can help with
    6·1 answer
  • Problems of mobile phones
    8·1 answer
  • What power brake uses vacuum from the engine to aid in brake application?
    6·2 answers
  • Create a program that receives the age of a user and determine whether he/she can vote or not. Assume the voting age to be 20. C
    14·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • Take a minute to reflect on your thoughts and learning so far and discuss:
    13·1 answer
  • What is the correct sequence in which a computer operates​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!