1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
4 years ago
13

Do you think that distributed OSs use a process-communication technique different from that used by desktop OSs?

Computers and Technology
1 answer:
Lady_Fox [76]4 years ago
3 0

Answer: Yes

Explanation: A distributed operating system use a technique to comunicate across all the nodes that were connected to it while the communication maded by a desktop operating system is directly with the system itself, we can use a distributed operating system to get connected through various desktop operating system.

You might be interested in
Identify the selector in the following CSS code:
SashulF [63]

Answer:

The right answer is: Option A. h3

Explanation:

The purpose of using selectors in CSS is to find the elements in the HTML page to which the formatting will be applied.

Different type of selectors are used in CSS.

In the given code, h3 is the selector.

All the <h3> elements on the page will be of orange color and will have font size 12.

Hence,

The right answer is: Option A. h3

6 0
3 years ago
The answer for 1 and 2
Mrrafil [7]
1. A.  It is basically the definition of a political cartoon.
2. D. They used newspaper, protesting, and marches.
<span />
6 0
4 years ago
The Windows ____ window allows you to create the graphical user interface for your application.
DerKrebs [107]

The Windows GUI window allows you to create the graphical user interface for your application.

8 0
3 years ago
Can You do this to help me plz 50 points
MakcuM [25]
The doc is blank but thanks for the points!!
6 0
3 years ago
Read 2 more answers
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Other questions:
  • As you explore career options why is it important to take personal inventory is and assessments
    13·2 answers
  • Which of the following tasks can you perform using a word processor?
    12·1 answer
  • A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.
    13·1 answer
  • The ____ command is used to disconnect a datatable object from the database. (
    15·2 answers
  • ________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf
    11·1 answer
  • An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat
    13·1 answer
  • When an Item is base lined, it becomes frozen, here frozenmeans that only creating an old version can change the item
    9·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • Use a for/else loop to traverse through the key names in the dictionary below in order to find Mr. Potatohead’s mailing address.
    7·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!