1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
10

2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.

Computers and Technology
1 answer:
Artist 52 [7]3 years ago
6 0

Explanation:

Operating system is a system software, whereas,  Kernel is a part of operating system. Operating system acts as an interface between user and hardware. Kernel acts as an interface between applications and hardware. In Linux, for example, device drivers are often part of a kernel (specifically Loadable Kernel Modules).

You might be interested in
T.J. wants to send a friend a file with a funny dancing cat. Which file format should T.J. use?
masha68 [24]

Answer:

If it is a Gif, then T.J. should, obviously, use the GIF format, but I think the answer you're looking for is MP3, since that is generally (at least for me) what videos are sent as!

Hope this helps(:

Explanation:

7 0
4 years ago
Read 2 more answers
A USB flash drive uses solid
steposvetlana [31]
State drive. SSD=Solid State Drive
8 0
3 years ago
Groupthink refers toA) the willingness of individual group members to withhold contrary or unpopular opinions, even when those o
Ivan

Answer:

The correct answer is A.

Explanation:

Groupthink is a theory that is applied to decision making psychology in groups, developed by Irving Janis. The theory roots itself to the problem of conformity especially in group settings. When a decision is made in a group, some members, even though they believe that the decision made is wrong or can be better, get caught up in the conformity problem and follow the accepted solution to allign with the group's decision.

I hope this answer helps.

5 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
What type of information is appropriate for headers and footers? Check all that apply.
lbvjy [14]

Answer:

slide/page number

smart art

maybe date and time

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Can I recover my data from HDD if I just started formatting but did not finish it? (I ceased it!)
    7·1 answer
  • Which service is used when your email program exchanges messages with the mail server on a distant network?
    5·1 answer
  • After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​
    6·1 answer
  • How can a Word user insert a page break into a document to isolate a table on a new page?
    13·2 answers
  • What is the maximum rate at which computers A and B can communicate, via router X? (your answer should be in Mbps)
    12·1 answer
  • You want to print only the fourth page of your research document. What would you do?
    9·2 answers
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • What causes the poles of the electromagnet in an audio speaker to repeatedly switch directions?
    6·2 answers
  • 1 cup coffee cream = ____ tbsp butter plus ____ c milk
    11·1 answer
  • What is a "Top-Level Domain Name"?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!