1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
4 years ago
7

1 Which of these is not an Operating System ?

Computers and Technology
2 answers:
trapecia [35]4 years ago
6 0



Hi Pupil Here's Your answer :::




➡➡➡➡➡➡➡➡➡➡➡➡➡



The correct answer is option B that is MS Word

The rest of all are operating systems except MS word that is a word processing software .



⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps . . . . . .


Naya [18.7K]4 years ago
5 0
MS word is the answer ..m
You might be interested in
Network access control authenticates users logging into the network and determines what data they can access and actions they ca
erik [133]

Answer:

The answer is letter A

Explanation:

The statement is TRUE

3 0
4 years ago
Key Vocabulary:
telo118 [61]

try is input

And which show after opening is output

4 0
3 years ago
In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
katen-ka-za [31]

Answer:

Web server

Explanation:

4 0
3 years ago
(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
vovangra [49]

Answer:

1.similarity:

  • they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

  • .<em>a</em><em> </em><em>click</em> is pressing and releasing the left mouse button once
  • <em>right </em><em>click</em> is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selection
  • <em>double </em><em>click</em> is pressing the left button twice in rapid succession
  • <em>drag </em><em>and </em><em>drop</em> is where by the user drags an icon or item from one location on the screen to another.

3 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Other questions:
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • 12.
    10·1 answer
  • Match the items with their respective descriptions.
    6·2 answers
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • after clicking the start button on your computer screen desktop what option would you then select to examine system components y
    15·1 answer
  • Please help,it’s a year 9 question
    7·1 answer
  • Program a substitution cipher in Python. Create 2 functions one for encryption and the other for decryption ( get the text as th
    8·1 answer
  • Differentiate the term, "bundling," as applied to a Mac/Apple computer and a PC.
    5·1 answer
  • Develop a program working as a soda vending machine. The program should show the product menu with price and take user input for
    11·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!