1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
13

Apple's macOS and Microsoft Windows are examples of ________ software. utility application communication operating system

Computers and Technology
1 answer:
Elza [17]3 years ago
8 0

Answer:

The answer is Operating system software

Explanation:

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language.

Below are the common operating system software;

Microsoft Windows

Apple iOS

Google's Android OS

Apple macOS

Linux Operating System.

You might be interested in
The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
dangina [55]

Answer:

Banner Grabbing

Explanation:

Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.

Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers.  divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.

Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.

4 0
4 years ago
You designed a program to find the midpoint of two points. Which step below corresponds to finding the average of the x-coordina
MrRa [10]

Answer:

Perform any needed calculations or data manipulations.

Explanation:

just did the test

hope it helps

8 0
3 years ago
Given storeMonthlySales NUM STOREST[NUM MONTHST[NUM DEPTS] is a three-dimensional array of floating point values. Write a C++ fu
iogann1982 [59]

Answer:

Y

Explanation:

YEZ

5 0
4 years ago
The purpose of the ________ element is used to configure the headings for a web page document or section of a web page document.
Vesnalui [34]
The answer would be "Inspect"
7 0
4 years ago
Why is the cpu the most important component in a computer?
german
CPU (Central Processing Unit) is also known as the brain of the computer because this is the place which actually runs the programs. The programs are the set of instructions needed to perform a task.
4 0
3 years ago
Other questions:
  • Show what this program prints. Be exact and complete. Can you explain the behavior of each print statement? 1 2 3 4 5 6 7 public
    12·1 answer
  • An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
    11·1 answer
  • 1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (
    12·1 answer
  • Master pages are used to create
    7·1 answer
  • The code that is executed when the user clicks a button is known as ________.
    7·1 answer
  • Brian needs to see the space available to insert content on a slide in his presentation which feature of the presentation should
    10·1 answer
  • LAB: Parsing dates in M/D/Y format
    5·1 answer
  • List and briefly describe the major types of system in organization?​
    15·2 answers
  • In python, what is the difference between a dictionary and a set? How are they similar?
    11·1 answer
  • suppose a network could gaurantee that all delivered packets were delivered in order. if a reliable transport protocol designer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!