1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
12

Functions of operating systems​

Computers and Technology
1 answer:
Jobisdone [24]3 years ago
7 0

Answer:

The functions of operating system are:

Explanation:

It protects the user to create,copy,delete,move& rename files & folders.

It protects the stored information from unauthorized users & denies them access to data.

It manages the storage and retrieval of data from disks.

It manages the input to and output form of computer system.

You might be interested in
Which term refers to actions that you would typically perform on a computer to revive it even if it functions in an unexpected m
sweet-ann [11.9K]
You'd usually reboot a PC if it malfunctions.
6 0
3 years ago
A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
aleksklad [387]

Answer:

D.

Explanation:

Binary searches are required to be first sorted, since they use process of elimination through halving the list every round until the answer is found. Linear searches just start from the beginning and check one by one.

6 0
3 years ago
Medium-term goals describe what you want your business to achieve (a) in ten years, (b) in terms of market share, (c) in two to
77julia77 [94]

The correct answer to this question is Choice C- in two to five years.

Your medium-term goals may build upon your short term goals. For example, your short term goal may be to save $1,000. Building upon this, your medium-term goal could be to save $5,000.

3 0
3 years ago
What methods do phishing and spoofing scammers use?
Misha Larkins [42]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

4 0
3 years ago
Задача в том, чтобы считать
Levart [38]
I’m not sure what you are saying
5 0
3 years ago
Other questions:
  • Pedestrians, cyclists, horse drawn vehicles and wheel chair users are known as ___________
    6·2 answers
  • The two types of objects responsible for collecting data are
    14·1 answer
  • Which of the following statements is false? a. Classes (and their objects) encapsulate, i.e., encase, their attributes and metho
    15·1 answer
  • What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a re
    15·1 answer
  • The ArrayList class contains a trim method that resizes the internal array to exactly the capacity. The trim method is intended
    11·1 answer
  • Which best describes obliteration in a forged document?
    11·1 answer
  • How do medical detectives investigate their cases?
    15·2 answers
  • At Chicago Cubs games, residents across the street from Wrigley Field can watch the game from their apartment windows. Many of t
    14·1 answer
  • I need some asap pls
    9·2 answers
  • 1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!