1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
5

What is an Operating system??

Computers and Technology
1 answer:
lianna [129]3 years ago
4 0
An operating system for a computer is software that help all the computer's software and hardware understand each other. It manages all the parts of the computer, without the operating system the computer can not do anything
You might be interested in
What is closeable interface in java.
alisha [4.7K]

Answer:

A Closeable is a source or destination of data that can be closed. The close method is invoked to release resources that the object is holding (such as open files).

Explanation:

hope it help?

8 0
3 years ago
JKJKNJJNJJJLKN;K;L;LHNL;BJ
bezimeni [28]

did you have a stroke bestie?

8 0
3 years ago
Read 2 more answers
PLZ HELP WITH SPEED i need the answer<br><br> WILL GIVE BRAINLIEST
jeka57 [31]

Explanation:

1. register-true

2. line spacing

3. before text

4. first line

8 0
3 years ago
What are the pros and cons for E-trade?
Bezzdna [24]

Answer:

Pros                                            Cons

• Free stock and ETF trading • Higher fees for non-free mutual funds

• Some mutual funds and bonds are free

• Low non-trading fees

3 0
3 years ago
Read 2 more answers
QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
valkas [14]

Answer:

The correct answer to the following question will be Option B (Public key infrastructure).

Explanation:

This seems to be a program that allows an individual to deliver an encrypted message or file through some kind of public key that can be unlocked by the intended receiver using another key or code, almost always a private or personal key.

  • This is a collection of functions, rules, equipment, applications, and methods required to develop, maintain, deliver, utilize, save, and withdraw digital credentials, and handle encryption with the public key.
  • This safeguards against hacking or interference with customer information or data.

6 0
3 years ago
Other questions:
  • Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
    9·1 answer
  • Design and implement a GUI application that uses text fields to obtain two integer values (one text field for each value) along
    9·1 answer
  • How will you ensure that all of the network's applications and tcp/ip services also support ipv6?
    10·1 answer
  • Hey guys, quick question:<br><br> What are the positives and negative’s of GUI’s??
    5·2 answers
  • In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message
    11·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
  • ____coping skills are instinctive.<br> A. All<br> B. No<br> C. Some
    9·1 answer
  • Commercial technical data and commercial software:_________.
    11·1 answer
  • What is an a free open source content management system for publishing web content​
    8·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!