1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
8

Which of the following are the functions of an os?

Computers and Technology
1 answer:
cricket20 [7]3 years ago
6 0
Manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.
You might be interested in
Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
Neko [114]
The answer is the second answer Increasing the size of the wire.
8 0
3 years ago
Business Risks are ​
blondinia [14]
Business risk is the exposure a company or organization has to factor(s) that will lower its profits or lead it to fail.
8 0
3 years ago
Typically, the first item in defining a function is _____. (Points : 4)
sveticcg [70]

Answer: Naming the function

Explanation:

 The first item for defining the function is the naming of the function. In the function, the first line is known as header and rest of the function is known as body of the function.

The function name is the first step while defining the proper function as we can define the actual function name on which the program are rest based.

We can define a function from which the each value from the set of the components are basically associated with the second component in that particular function.

 

8 0
3 years ago
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
Identify the subject: Computer graphics are amazing these days.
Shtirlitz [24]
B.................................
3 0
4 years ago
Read 2 more answers
Other questions:
  • Which one of the following is NOT a type of reference method that uses a terminal digit system? 1) Account payables 2) Medical r
    11·1 answer
  • If you have cable internet service, what protocol is used between the head end connection and the cable company's network
    8·1 answer
  • How long after you install a new toilet until you can use it?
    15·1 answer
  • Write a zip code class that encodes and decodes 5-digit bar codes used by the U.S. Postal Service on envelopes. The class should
    11·1 answer
  • _______________ is the use of IT in communication. a) email b) Chatting c) FTP d) All of the above
    7·1 answer
  • 1) a program that is designed to perform only one task.
    11·1 answer
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
  • in windows 10, what feature is used to locate and launch software or applications installed on your device?
    8·1 answer
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
  • * Describe the five components of a<br> computer
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!