1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
6

Explain 5 service provided by Internet​

Computers and Technology
1 answer:
Travka [436]3 years ago
3 0

Answer:

Apex legends, Snap chat, face book, twitter, you tube

Explanation:

They are all connected to the internet they are all provided via internet

You might be interested in
If your computer requires that you install memory in pairs, it doesn't matter if the two memory modules are the same type, size,
monitta

Answer:

False

Explanation:

If your computer requires that you install memory in pairs you should always keep in mind that

1. Both are the same type(DDR4+DDR4, DDR3+DDR3, DDR2+DDR2...)

2. Both are the same size (2GB+2GB, 4GB+4GB, 8GB+8GB...)

3. Both are the same speed (800MHz+800MHz, 1666MHz+1666MHz, 3200MHz+3200MHz...)

This is important, because of the predefined slots that are located on the Motherboard.

Although you can change the RAM speed from the BIOS you can not change the predefined slot values

5 0
4 years ago
You need to install an operating system on a computer that will be sharing files for the company employees. You estimate there w
TiliK225 [7]

The operating system that is ideally suited for this machine that will be sharing files for the company employees with an estimated of as many as 15 users accessing these files at one time is Windows Server 2003 Standard Edition.

This operating system is best suited to handle the load of 15 concurrent users.

3 0
4 years ago
When an interrupt transfers control to an operating system, a Kernel stack area separate from the stack of the interrupted proce
Roman55 [17]

Answer:

Control is transmitted to the operating system when an interrupt happens, which determines what action is to be done to be taken or usually what interrupt services.

  • If the kernel leaves data in the memory space of a user program when returning from a system call, it may be possible for a malicious user to use this data to find out about other processes.
  • In these systems, the kernel synchronizes by preventing interrupts in critical sections with interrupt handlers on a processor.
  • Operating system may crash if it controls the interrupts because a poorly written user program does not provide sufficient stacking room.
5 0
3 years ago
What would I need to make the perfect music video
Lera25 [3.4K]
To make the perfect music video, you would need a bunch of b-roll and clips that relate to the song. If it’s a slow, relaxing song, you want things that are slow and represent peace. If it’s about something specific, you should have a story behind it to explain. Hope this helps! :)
4 0
3 years ago
The FAT method ______________.
AnnyKZ [126]

The FAT method incorporates free-block accounting into the allocation data structure.

The File Allocation Table (FAT) method is a file system designed to store file information in a designated entry format. The operating system makes use of it to manage files on hard drives and other computer devices.

It usually comprises an entry for each block. As such, it is indexed via the block number. This helps to locate files faster based on the address of the given number of the free blocks as opposed to using the traditional grouping method.

Learn more about the File Allocation Table (FAT) method here:

brainly.com/question/4671431

8 0
2 years ago
Other questions:
  • If you like to interact with the game’s environment rather than with its inhabitants, which Bartle player type would you conform
    12·2 answers
  • You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
    12·1 answer
  • Explain about RDBMS. Include advantages/ disadvantages. Compare DBMS vs RDBMS. Explain about Oracle as well.
    14·2 answers
  • When creating a password, users tend to use Select one: a. All capital letters b. Passwords that are too long c. Familiar phrase
    9·1 answer
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • Which of these has the LEAST impact on causing the phenomenon known as acid raid?
    8·2 answers
  • In object-oriented programming, the object encapsulates both the data and the functions that operate on the data.
    10·1 answer
  • Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
    11·1 answer
  • What is one example of the use of an infrared sensor?
    13·2 answers
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!