1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
11

Help me or I'll go insane I've 6x already I'm about to lose it!!!!

Computers and Technology
2 answers:
Lemur [1.5K]3 years ago
5 0
Two:
<span>Hiding the complexities of hardware from the user.
Managing between the hardware's resources which include the processors, memory, data storage and I/O devices.
Handling "interrupts" generated by the I/O controllers.
<span>Sharing of I/O between many programs using the CPU.

Three:
</span></span><span>Desktops
icons
menus
windows.</span><span>

Seven:
</span><span>The convention is that ellipses following a menu item usually means that the menu item will open a dialog box with further choices, rather than immediately carrying out an action.
</span>
Eight:
Organize Your Files

Nine:
Use the save as Command
name the File

Ten:
Open the file you want to delete
Select the file you want to delete
select Delete from the file menu
Confirm the deletion

Hope this helps
ololo11 [35]3 years ago
4 0

Answer:

two:

Hiding the complexities of hardware from the user.

Managing between the hardware's resources which include the processors, memory, data storage and I/O devices.

Handling "interrupts" generated by the I/O controllers.

Sharing of I/O between many programs using the CPU.

Explanation:

You might be interested in
What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
Mrac [35]

Answer and Explanation:

E-commerce and e-business is a major business of the present time using the internet. It is basically defined as the online selling of goods or making any business online. Internet is the basic requirement for the e-commerce or e-business as

  • it helps in providing the internet connectivity so that the e-business can be displayed online and users can buy goods or interact with seller regarding the business.
  • Due to internet service users get to know about the online business and thus the business attains economic growth and benefit.

6 0
3 years ago
Which avenue may utilize video streaming, audio narration, print designs and animation?
Shtirlitz [24]

Answer:

Multimedia avenue.

Explanation:

A file type is the standard used to store data such as pictures, texts, videos, and audios. All file types have unique file extension that determine which program to use to open a particular file and to access its data e.g pictures (jpeg, png), texts (txt, docx, rtf), videos (mp4, 3gp, avi), audios (mp3, acc).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

Basically, all software applications are designed and developed for use with specific file extensions or formats and as such, when used to open a file it isn't developed for, it result in an error.

A multimedia avenue refers to a channel that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc. A common example of a multimedia avenue is Microsoft PowerPoint software.

Hence, the multimedia avenue may utilize video streaming, audio narration, print designs and animation.

8 0
2 years ago
Becky is preparing a document for her environmental studies project. She wants to check her document for spelling and grammar er
Sunny_sXe [5.5K]
If it's MS Word (it probably is), then it's Alt + F7
7 0
2 years ago
Read 2 more answers
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Which set of symbols encloses an if-then code block? Choose the best answer.
Colt1911 [192]

Here's some code that might help, assuming that you are using JavaScript.

e = "Hello"

if(e === "Hello"){

    alert(":D")

}else{

    console.log("Um.")

}

I think that the answer is curly brackets.

8 0
3 years ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
    13·1 answer
  • Two different ways to bring up My Computer folder
    11·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    13·2 answers
  • What game is this?????????????????????
    15·1 answer
  • Select the best answer from the drop-down menu.
    14·2 answers
  • What is data science?​
    15·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
  • Which of the following do nylon and Kevlar fibers have in common?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!