1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
6

The role of Operating system​

Computers and Technology
1 answer:
Fudgin [204]3 years ago
5 0

the role of an os or operating system is the program that executes everything and makes the computer usable hope this helps

You might be interested in
You want to divide the value in cell D3 by the value in cell E3. Which formula should you use?
Tom [10]
The formula is:
=D3/E3
4 0
3 years ago
Read 2 more answers
Digital manufacturing has impacted our world today! List a reasons why.
Maru [420]
Because we can get manufacturing faster than usual
6 0
3 years ago
explain why the database system would not allow a tuple to be inserted into the database through this view
Andrej [43]
For the view of Exercise 4.18, explain why the database system would not allow a tuple to be inserted into the database through this view.
For reference
For the database of Figure 4.12, write a query to find the ID of each employee with no manager. Note that an employee may simply have no manager listed or may have a null manager. Write your query using an outer join and then write it again using no outer join at all.
OUTER JOIN
select e.ID from employee e left outer join manages m on e.ID = m.ID
where m.manager_id is null;
NO OUTER
select e.ID from employee e where e.ID not in (select m.ID from manages m) or e.ID in (select m.ID from manages m where m.manager_id is null);
6 0
3 years ago
What e-reader technology males a screen that is easy to read and extends battery life
lidiya [134]
I personally use the Kindle Paperwhite series, but any with an E-ink display will work great, as the display isn't very battery-consuming.
6 0
3 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
Other questions:
  • Search engines enable you to
    13·2 answers
  • If i throw papers in the dryer to help them dry faster could that mess up the dryer?
    5·1 answer
  • Select the correct answer.
    9·1 answer
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
    10·1 answer
  • How do I sign into raterhub on my phone and my mobile device at the same time to complete phase 2 of my raters exam for sykeshom
    10·1 answer
  • The two principal catalysts for the Information Age have been:________.
    15·1 answer
  • How to create a distribution list in outlook?
    7·1 answer
  • What is a fire wall and how does it work
    14·1 answer
  • How would you define the term technology
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!