1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
10

The Operating System is used to locate, move, and copy files.

Computers and Technology
1 answer:
Temka [501]3 years ago
7 0

Answer:

Yes!! the operating system is used to locate, move, and copy file

You might be interested in
What are the step by step instructions on how to rename a document(without opening it) that is filed in my computer/my documents
SpyIntel [72]
Right click it then thell be options like DELETE if u look there a RENAME option click-it then the fomer name will highlight then you enter a new name :3

8 0
4 years ago
Which of the following describes an executive information system (EIS)?
rjkz [21]
I think the answer is b

hope this helps :)
3 0
3 years ago
How is an orthographic drawing similar or different from an isometric drawing
Savatey [412]
An Isometric drawing<span> is a quasi 3d </span>drawing<span> that shows the height width and depth of the object in a single view where the viewpoint is at a 45 degree angle from each of the perpendicular planes of the </span>orthographic<span> view. </span>Isometric<span> differs from a perspective view in that all lengths are shown true length.</span>
6 0
3 years ago
What is containment and why is it part of the planning process
Salsk061 [2.6K]

Answer:

Isolating affected channels, processes, services, or computers; stopping the losses; and regaining control of the affected systems. It is part of the planning process to identify the best containment option for each scenario or system affected.

Explanation:

8 0
3 years ago
What is ana absolute adress
AleksAgata [21]

Answer:

The term <u>absolute</u> distinguishes it from a relative address, which indicates a location specifying a distance from another location. <u>Absolute addresses</u> are also called real addresses and machine addresses.

Explanation:

Sorry, I'm not so good at explaining things.. I hope I kinda gave you an idea on what it is though.

8 0
4 years ago
Other questions:
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • . If you have written the following source code:
    9·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Your mother wants to purchase a larger hard drive for her computer and asks you to see what type of drive interface she has. her
    6·2 answers
  • The SPF strategy can be proven to be optimal in the sense that it minimizes average response times. In this problem, you will de
    10·1 answer
  • HELP PLEASE!!!
    7·1 answer
  • Information in _____ code can be transmitted without errors over the communication network.
    13·2 answers
  • Jabari created new video game for his coding course. What is one way he should format his pseudocode?
    12·1 answer
  • Variables that can take only 2 variables are referred to as which one of the following?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!