1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
2 years ago
7

What tasks do most operating systems perform?

Computers and Technology
2 answers:
devlian [24]2 years ago
8 0

I would say: This is most common.

3, 5, 6

Slav-nsk [51]2 years ago
8 0

The correct options are as below:

1. Allocating RAM to open programs

2. Indexing files and folders

3. Managing communication between hardware and software

6. Providing icons users can click on to open programs

Further Explanation:

The operating system (OS) manages all of its software and hardware efficiently. In a computer, many programs are running at a time. The operating system maintains the communication between the programs. All the program need to access the memory, central processing unit and storage. The operating system maintains all of them so that each program gets what it needs.

Some main functions of operating system are as below:

  1. Allocating RAM to open programs.
  2. Creating and maintaining the file allocation table.
  3. Coordinating the interaction between hardware and software.
  4. Displaying the GUI

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: Senior Secondary School

Subject: Computer Science

Chapter: Operating System

Keyword:

Computer, network, CPU, RAM, ROM, hardware, software, files, folders, indexing, communication, user, icon, operating system, Windows, Linux, Ubuntu, MAC OS

You might be interested in
design aDesign a queue abstract data type for float elements in a language that you know, including operations for enqueue, dequ
Yuri [45]

Answer:

Check the explanation

Explanation:

Due to difficulty in submitting the code on the brainly text editor, it has been written and uploaded, check the below attached image that shows the designed queue abstract data type <u><em>(which is defined by the following operations and structure, when a queue is structured, as expressed in the above statement, as an prepared or structured item collection which are added at one end, that is often called the “rear,” and detached from the other end, called the “front.”) </em></u>for float elements.

8 0
3 years ago
Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
Westkost [7]
Im really not sure but i need points so i can ask questions so i can get my math classes done so then i can graduate sos help
5 0
3 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
3 years ago
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
2 years ago
Which of the following events would most likely produce an earthquake
sveticcg [70]

Earthquakes are usually caused when rock underground suddenly breaks along a fault. This sudden release of energy causes the seismic waves that make the ground shake. When two blocks of rock or two plates are rubbing against each other, they stick a little. ... When the rocks break, the earthquake occurs.

8 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • ____ is typically used with lans that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-o
    12·1 answer
  • Help what is a computer made from (computer class question)!!
    9·1 answer
  • At the beginning of a chapter in a book, the first letter often appears larger than the other text on the page. This
    15·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • When a new word processing software program is released, companies that might use it must consider not only the cost of buying i
    13·1 answer
  • Darcy was working on a presentation on playing chess. Because she chose the Checkerboard animation for her slide title, she had
    15·2 answers
  • I made Pico with a Ray Gun (Next is Dad/Tankman)<br><br> Opinons?
    11·2 answers
  • Three types of keys on the keyboard​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!