1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
11

What is the term given to the controls that let you interact with an operating system?

Computers and Technology
1 answer:
Sophie [7]3 years ago
4 0
Inputs are the contols that let you interact with an operating system.
You might be interested in
Wired network are the most reliable and provide the highest speed?
lbvjy [14]

A wired connection is almost always reliable and fastest, so that one gets a True.

When it comes to wireless networks, it really just depends on how you're setting them up.  A normal wireless set up is generally effortless to set up because a lot of router manufacturers include wizards in the router's firmware to help you get started, so that gets a False.

8 0
3 years ago
What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red
igor_vitrenko [27]

Answer:

Data Deduplication

Explanation:

In computing, data deduplication is a technique for eliminating duplicate copies of repeating data. This is also called single-instance storage.

Only applicable to Windows Server 2012 and newer versions, Data deduplication techniques ensure that only one unique instance of data is retained on storage media, such as disk, flash or tape.

Cheers

7 0
3 years ago
To enter a typed number into a cell, you press Tab or Backspace?​
muminat

Answer:

bOTH

Explanation:

7 0
3 years ago
Read 2 more answers
Direct messaging is similar to email, except
fredd [130]
No personal web..............
6 0
3 years ago
Read 2 more answers
What electronic appliances at your home / school can be controlled remotely? Name any 4
Paladinen [302]

Answer:

Hi how are you doing today Jasmine

8 0
2 years ago
Other questions:
  • Lossless and lossy are the two (2) universally known categories of compression algorithms. Compare the two (2) categories of alg
    8·2 answers
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
    11·2 answers
  • Adding Page Numbers in the Footer
    15·1 answer
  • The first page of a website is what?​
    5·2 answers
  • What is the output of the following JavaScript code?
    9·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • PLS HELP SOON
    15·1 answer
  • What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!