1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
5

Explain how the operating system controls the software and hardware on the computer?

Computers and Technology
1 answer:
NemiM [27]3 years ago
8 0

<em>One of the features of Operating System is </em><em>it manages and communicates with your system hardware </em><em>by means of Drivers. </em>

<em>Drivers </em><em>are special software within the OS that interacts to the hardware. Drivers uses kernel, a part of the operating system that functions intended to it. For example, when you press Ctrl and P keys on the keyboard, the kernel would recognize this command and would trigger the corresponding hardware in relation to this command. In this case, the corresponding hardware is printer. The kernel would tell the printer to print the document.</em>

You might be interested in
Which algorithm makes the most efficient use ofmemory?
SashulF [63]

Answer:

Best-fit Algorithm

Explanation:

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.

<u>Example</u>

Let these are the memory locations-210kb,310kb,260kb,610kb

                    and size of processes-160kb,450kb,250kb,300kb

For the first-fit,

We allocate 160 kb to the 210kb memory location

Then, we allocate 450 kb to the 610kb because others don't have the size.

Then,we allocate 250kb to the 310 kb.

300 kb will stop,as no memory locations can execute.

For the Best-fit,

We allocate 160 kb to the 210kb memory location

Then,we allocate 450kb to the 610kb.

Then,we allocate 250kb to the  260kb not 310kb according to best-fit.

Then we allocate 300kb to the 310kb.

For the worst fit,

We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.

Then,we can't allocate 450kb to any memory location.

Then,we allocate 250kb to the 310kb .

We can' allocate 300kb in 260kb memory location.

As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.

In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.

In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.    

5 0
3 years ago
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
jekas [21]

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
Galina-37 [17]
<span>The statement that IPv6 includes a native information security framework (IPsec) that provides both data and control packets is false.
</span>IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data <span>as it is sent over the network,. and not control packets.
</span>The IPv6 IPSec is a set of Internet standards that uses cryptographic security services to provide confidentiality ,data origin authentication and data integrity<span>
</span>

5 0
3 years ago
Using bearings will cause more friction. Group of answer choices True False
Olegator [25]

Answer:

False

Explanation:

6 0
3 years ago
Write a java program called allDigitsOdd that returns whether every digit of a positive integer is odd. Return true if the numbe
Vlada [557]

Answer:

public class Digits

{

   public static boolean allDigitsOdd(int num)

   {

       boolean flag=true;

       int rem;

       while(num>0)

       {

           rem=num%10;

           num=num/10;

           if(rem%2==0)    // if a even digit found immediately breaks out of loop

           {

               flag=false;

               break;

           }

       }

       return flag;     //returns result

   }

   public static void main(String args[])

   {

       System.out.println(allDigitsOdd(1375));    //returns true as all are odd digits

   }

}

OUTPUT :

true

Explanation:

Above program has 2 static methods inside a class Digits. Logic behind above function is that a number is divided by 10 until it is less than 0. Each time its remainder by 0 is checked if even immediately breaks out of the loop.

4 0
4 years ago
Other questions:
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • Carol typed a memo to send to everyone in her department. To create this memo, she used a _____. spreadsheet word processor fax
    10·2 answers
  • Florida Highway Safety and Motor Vehicles reported blank of traffic fatalities were alcohol-related in Florida in 2009.​
    8·1 answer
  • To display the Color gallery, with the graphic selected, click the Color button in the ____ group on the PICTURE TOOLS FORMAT ta
    14·1 answer
  • Answer the queston...........​
    7·2 answers
  • The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this qu
    14·1 answer
  • How do you customize calendar view​
    9·2 answers
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • Unconformities develop when new sedimentary layers accumulate atop old, eroded layers, resulting in a geologic hiatus. Which of
    9·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!