1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
3 years ago
9

¿Quién recibe la orden de ejecución de un programa enviada por el usuario?

Computers and Technology
1 answer:
algol [13]3 years ago
4 0

Answer:

El sistema operativo.

Explanation:

En ciencias de la computación, una orden es una instrucción a un sistema operativo de computadora para realizar una tarea específica. Generalmente, una orden se emite a través de una interfaz de línea de órdenes de otro programa. Así, se trata de una instrucción a un programa de computadora para que actúe como intérprete para resolver un problema.  

Por ejemplo, podemos pedir a través de una orden que muestre el contenido de una carpeta, buscar un archivo en particular y especificar mediante parámetros adicionales cómo se debe realizar esta acción (por ejemplo, utilizando expresiones regulares para realizar una búsqueda).

You might be interested in
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
professor190 [17]
It’s called a firewall! :)
3 0
3 years ago
Write a script to check command arguments (3 arguments maximum). Display the argument one by one. If there is no argument provid
serious [3.7K]

Answer:-args (

if:args=true

-cont

if:args=false

-cont investigating

if:args=irrelevance

-loop restate args

)

compile exec

Explanation:

7 0
3 years ago
Choose which statement is wrong by applying your knowledge from the reading. a. A security manager works on tasks identified by
Novosadov [1.4K]

There are reasons why a statement can be wrong. The option that is a wrong statement is Since 2015, the number of unfilled cybersecurity positions has increased by 10 percent.

<h3>How are many cybersecurity jobs unfilled?</h3>

The U.S. is known to have a high total employed cybersecurity workforce and some that are unfilled positions as reported by Cyber Seek.

Studies has shown that since 2015, the number of unfilled cybersecurity positions has gone up by 50 percent. Such that  the total expected rate has been approximated to be at 1.8 million open cybersecurity positions by 2022.

Learn more about cybersecurity from

brainly.com/question/14286078

8 0
2 years ago
Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() fu
Liula [17]

Answer:

Written in C++

#include <iostream>

#include <sstream>

using namespace std;

int main()  {

   string num;

   cout<<"Enter a number: ";

   cin>>num;

   stringstream sstream(num);

   int convertnum = 0;

   sstream >> convertnum;

   cout << "Output: " << convertnum;

}

Explanation:

Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:

This line declares a string variable num

   string num;

This line prompts user for input

   cout<<"Enter a number: ";

This line gets user input

   cin>>num;

This line declares a string stream variable, sstream

   stringstream sstream(num);

This line declares and initializes the output variable, convertnum to 0

   int convertnum = 0;

The stream is passed into the output variable, convertnum

   sstream >> convertnum;

This line displays the output

   cout << "Output: " << convertnum;

<em>Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.</em>

<em>For instance,</em>

<em>40a will be outputted as 40</em>

6 0
3 years ago
()
tigry1 [53]

Answer:

did u just show us ur whole bill ??

Explanation:

ARE U GETTING EVICTED :o

5 0
3 years ago
Other questions:
  • Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must
    7·1 answer
  • Damage to which portion of the limbic system results in loss of memory of recent events and difficulty committing anything new t
    13·1 answer
  • Which of the following domain types is most trustworthy 1) .com 2) .tv 3).org 4) .edu
    15·2 answers
  • Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz s
    11·1 answer
  • World Book is a/an A. Social media platform. B. Textbook. C. Almanac. D. Encyclopedia.
    7·2 answers
  • Technician A says that high pressure in recycled refrigerant is only caused by air contamination. Technician B says that recycle
    15·1 answer
  • What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
    7·1 answer
  • what is one example of the decomposers taking from the ecosystem and one of them giving to the ecosystem
    14·1 answer
  • ____ is a technique for confirming that q received packet or frame is likely to match what was sent
    15·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!