1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
8

You just bought a new hard drive for your computer to replace your primary hard drive. After backing your data up and, then, ins

talling the hard drive you are now ready to install the operating system on it. What are the two main things does an operating system do?
Computers and Technology
2 answers:
Fofino [41]3 years ago
8 0


It manages the soft and hardware resources of the system. It also provides a stable, consistent way for applications to deal with the hardware without knowing all of the details of the hardware

Norma-Jean [14]3 years ago
7 0
The main purpose of an operating system is to allow the user to be able to access and use the computer hardware. So the operating system itself acts as an interface to all the computers components (hard drive, network card, memory, etc.). Having access to these components now allows you to run Software applications that utilize said components to do you work. So you could say 2 main things are:
1. An OS acts as an interface to the computer's hardware components and resources. (RAM, disk, Network card, etc.)
2. Serves as a platform to run software applications that utilize said components to perform a function. (Think internet explorer accesses network card which allows you to go out to the internet).
You might be interested in
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
what are some examples of security goals that you may have for an organization? check all that apply.
ExtremeBDS [4]

An examples of security goals that you may have for an organization is:  

  • To protect customer data against unauthorized access.

<h3>What is customer credentials about?</h3>

The goal of a firm in terms of security is to Safeguards or Defend customer credentials or details.

Therefore, An examples of security goals that you may have for an organization is:  

  • To protect customer data against unauthorized access.

Learn more about security goals from

brainly.com/question/14139033

#SPJ11

6 0
2 years ago
Where Can I Get Actual Microsoft AZ-900 Exam Questions?
Pachacha [2.7K]

Answer:

Pls check the site "examtopics"

U fill find ur questions there

8 0
4 years ago
Parts are described by partnum, color, and price. Parts can be subassemblies as well and this means that they contain other part
sladkih [1.3K]

Answer:

Attached is the solution:

5 0
3 years ago
Joe wants to use pictures from the Internet in a word processing program. Which is the most important aspect that Joe should con
IrinaK [193]

Answer:

B. Copyright

Explanation:

Joe needs to consider the Copyright as it is the legal means of protection of an author's work; it is the intellectual property that provides exclusiveness to the author's work, which menas that all the content and work created by the author, and protected by copyright cannot be used or published by anyone else without the consent of the author. For that reason, if the picture used by Joe has copyright it cannot be used in his project.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • Building relationships during your career exploration is called
    9·2 answers
  • What is an (CR) Optical character recognition?
    13·2 answers
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path
    10·1 answer
  • Before you enable data deduplication, what tool can you use to determine if data deduplication would benefit the tested volumes
    11·1 answer
  • the part of the computer that provides access to the internet is the A.modem B. keyboard C. monitor or D.system unit
    7·2 answers
  • Match each method of communication with its intended purpose.
    14·1 answer
  • Dash is a collection of sequentially arranged slides put together in the from of a file​
    8·1 answer
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!