1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
7

The biggest limitation of a network operating system (NOS) is _____ in terms of memory, process, device, and file management.

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
7 0

Answer:

Lack of global control.

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

There are different types of operating systems (OS) used for specific purposes and these are;

1. Batch Operating System.

2. Multitasking/Time Sharing OS.

3. Multiprocessing OS.

4. Single User OS.

5. Mobile OS.

6. Real Time OS .

7. Distributed OS.

8. Network OS.

A network operating system (NOS) can be defined as specialized computer operating system that are designed primarily for use on network devices such as routers, switches, workstations, which are mainly connected to a local area network.

Generally, the biggest limitation of a network operating system (NOS) is lack of global in terms of memory, process, device, and file management.

You might be interested in
Can You do this to help me plz 50 points
MakcuM [25]
The doc is blank but thanks for the points!!
6 0
3 years ago
Read 2 more answers
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
2 years ago
Read 2 more answers
According to policies and procedures, describe the process to report a hazard?
trapecia [35]
When u r in emergency
7 0
3 years ago
Read 2 more answers
Can someone help me on drawing ER and Use case diagram on following scenarios. ASAP!!! Please :(
GalinKa [24]

Answer:

The ER Diagram is in the attachment. And I an including the membership details in the use case:

Applicants: Coach will ask for iD.

if the application is not registered, coach sends to registration department.

Applicants registers-->> shows registration ID-->> goes to account section

Submits the fee->> goes to coach again-->>coach asks for fee sjip-->> On yes-->> entrance allowed else-->> sent to account section

Applicants apply for course-->>if prerequisite is met, registration allowed

else-->>registration denied

Note: If registration is allowed the applicant is sent to account section and

Also note:

First check, then registration, then course prerequisite check,then account->entrance

If registered->direct entry.

Explanation:

The answer is self explanatory.

4 0
3 years ago
bits of information that web sites use t identify you the next time you visit are called. a cupcakes b sno-cones c cookies d bro
jek_recluse [69]
Bits of information that web sites use to identify you the next time you visit that website are called C. Cookies.
5 0
3 years ago
Other questions:
  • In a social networking site your personal information is listed under your inbox. home. status. profile.
    11·1 answer
  • PLEASE HELP
    14·2 answers
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • What are the Database used in RDBMS and DBMS<br>please answer immediately​
    10·1 answer
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    7·1 answer
  • What was the first 1.0.1 version of openssl that was not vulnerable to heartbleed?
    5·2 answers
  • What target audience does your product serve?
    13·1 answer
  • What output is produced by the following code? Integer first = new Integer(7); Integer second = first; if (first == second) Syst
    15·1 answer
  • Colours can be contrasting if<br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!