1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
7

what programs controls all operations of the computer hardware such as memory storage devices or printers and provides for you t

o communicate with the computer
Computers and Technology
1 answer:
IrinaK [193]3 years ago
6 0
Operating Systems control all operations
You might be interested in
Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but
inna [77]

Question:

Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

A) disaster site

B) hot site

C) warm site

D) cold site

Answer:

The correct answer is answer is D)                  

Explanation:

A cold site is a business location that is utilised as a  backup in the event of a disruptive operational disaster at the normal business site. A cold site is an office, but it does not always have the necessary equipment to resume prompt operations. The business paying for the cold site, provides and installs this equipment.

Cheers!

6 0
4 years ago
I neeeeed a girl that is looking for true love, trust me i will love her
nignag [31]

Answer:

sure!

Explanation:

4 0
3 years ago
Read 2 more answers
The ____ is the ranking executive on-site when the crisis or emergency arises, who is authorized to initiate the CM plan.
aleksklad [387]

The answer is the Executive-in charge

The concept of an Executive-in charge came from the military’s chain of command. A chain of command ranges from a supervisor to the top executive of the organization. When a crisis arises, it is possible that one or more of the senior top managers may not be available for consultations because of the travel-intensive positions.






7 0
3 years ago
Read 2 more answers
Targeted attacks are easier and take less time and effort than attacks on targets of opportunity.
Mnenie [13.5K]

Answer:

False

Explanation:

Targeted attacks are usually harder because if someone has a password that is 1234 and you try it on 100 computers, you most likely will get someones password. If you are targetting a select computer with a strong password it is much harder to brute force or guess.

8 0
4 years ago
Computer programs can be opened from where?
lions [1.4K]

Answer:

Desktop

Explanation:

Start button on windows:  Start allows you to access your computer programs and configure Microsoft Windows easily by accessing the Start menu.

Finder on macs:  the Finder is your gateway to all of the files, apps, and downloads on your Mac.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • Complete the paragraph describing characteristics of an audio mixer
    8·2 answers
  • (70 points) This is a legit question that I have for a device FOR my homework.
    5·2 answers
  • Big films with big budgets typically have a few animators working on them. True False
    11·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • What is the definition of a flowchart? *
    13·1 answer
  • Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
    12·1 answer
  • The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
    14·1 answer
  • How to do the for loop in python
    12·1 answer
  • Complete the sentence.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!