1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
7

What is a collection of computer programs that administer the hardware and software of a computer so that they work properly?

Computers and Technology
1 answer:
slega [8]3 years ago
5 0

Answer:

Operating system

Explanation:

Operating system is a system software that manage all the software and hardware on a computer. It is the most important software in a computer. Operating system coordinates the entire communication process between software and hardware to ensure they work properly. It also manages the computer resources such as memory and storage spaces.

Some popular operating systems include Microsoft Windows, Mac OSX and Linux.

You might be interested in
Match the context details with the pattern that applies.
tia_tia [17]

Answer:

1. - Observer

2. - iterator

3. - strategy

4. - composite

5. - decorator

Explanation:

An object contains other objects (elements) and must give access to them for clients, without exposing its internal structure. This is an observation.

The subject-object can generate events as an iterable (iterator) and could use different strategic algorithms to achieve a task. Class objects can be used to aggregate other class objects.

In python, the decorator function mimics the outer function of a nested function, but still maintains the functionality of the second function

6 0
3 years ago
A type of backlight technology most commonly used in modern laptop devices is called____________.
alekssr [168]

Answer:

LED is the correct answer for the following question.  

Explanation:

LED is a display that is used in the Laptop screen which is a type of blacklight technology. Blacklight technology is a technology that is used to increase readability when the light is low.

An LED display is used in a modern laptop. It is a flat panel display. Its brightness is so high and allows a user to use it in the presence of the sunlight. It is designed in 1962 for the first time.

The above question asked about a blacklight technology that is used in a laptop device which is the LED display used in a modern laptop. Hence the answer is LED

7 0
3 years ago
The set of instructions that tell the computer what to do are called ____.
CaHeK987 [17]
Hi,

The word you are looking for is "programs".

Hope this helps.
r3t40
4 0
3 years ago
Read 2 more answers
Which type of image would require you to obtain permission from the author to use the image and possibly pay a royalty to the au
ASHA 777 [7]

Answer:

Copyrighted.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, a copyrighted image would require you to obtain permission from the author to use the image and possibly pay a royalty to the author for its use.

7 0
3 years ago
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
Other questions:
  • Select all that apply. Hyperlinks can appear as: words pictures symbols trademarks
    12·2 answers
  • When enter a function or formula in a cell, which is the character you must type?
    14·1 answer
  • What component of a motherboard is not considered to be a field replaceable unit?
    12·1 answer
  • Joshua takes ownership of all his tasks. Which quality is he demonstrating?
    9·2 answers
  • You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this
    12·1 answer
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • When cleaning a firearm, what end of the firearm should you generally clean from?
    11·2 answers
  • Name the months that have 30 days​
    6·2 answers
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • What are the specifications for a mine shaft headgear ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!