1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
7

How does operating system execute and provide services for application software​

Computers and Technology
1 answer:
ad-work [718]3 years ago
7 0
An OS is a set of programs that lies between application software and the hardware. An OS is software that controls the hardware. It provides the interface between the hardware and the user. The most important program in the OS is the kernel, it manages the OS and most of it remains in memory.
Hope this helps and BRAINLIEST PLEASE! ❤️
You might be interested in
The members of the IT department have spent two days debating the best approach to roll out the new software update. After allow
devlian [24]

Answer:

<em>Functional conflict</em>

Explanation:

Functional conflict means<em> encouraging workers to communicate different points of view and address disagreements in a healthy manner that can promote new ideas and new innovations.</em>

This compares with the unstable type of conflict that has no business advantage and only hurts the morale of interaction, productivity and workplace.

4 0
3 years ago
Two devices that may be used for creating,storing,and transmitting documents input devices
castortr0y [4]

Answer:

electronic notebook or a pc?

Explanation:

sorry if its wrong of doesnt help

6 0
3 years ago
Which of the following is true of public methods?
I am Lyosha [343]

Answer:

D) They can be accessed by any method in the same program

Explanation:

Public methods is a form of access modifier in a programming language such as Java, Phython, C#. However, unlike other types of access modifiers like Private Methods, Protected Methods etc they do not put any form of restriction on the access. Hence, in Public Methods members, methods and classes can be accessed from anywhere.

Therefore, what is true of Public Methods is that, they can be accessed by any method in the same program

8 0
4 years ago
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat
LUCKY_DIMON [66]

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

8 0
2 years ago
What will be the output if the user enters 2​
masya89 [10]

Answer:

You entered number two

Explanation:

Because even though it is greater than 0, it already has a set function in place.

7 0
4 years ago
Other questions:
  • Sarah is entering weekly sales data for week 37 of the current year; however, when she moves down to thecells where she needs to
    8·2 answers
  • Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
    13·2 answers
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • Lewis is using a stylus with his touch screen computer in order to draw a
    8·1 answer
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • What is a system unit
    7·1 answer
  • What is data analysing data and give three examples ?​
    9·1 answer
  • A10:A20 Refer to values in
    8·1 answer
  • Which of the following sentences use personification 
    9·1 answer
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!