1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
13

Describe how an operating system interacts with the computer.

Computers and Technology
2 answers:
enyata [817]3 years ago
6 0
The user requests an application to run by making a system call to get it started
erica [24]3 years ago
3 0

An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. ... In addition, users can interact directly with the operating system through a user interface such as a command line or a graphical user interface (GUI).Operating system is like a nervous system and the processor is brain.

Drivers

In order for the operating system to talk to your hardware, it needs drivers. Drivers teach the operating system to interact with each bit of hardware. Graphics cards, sound cards, networking cards, USB peripherals, and everything else you connect to your computer relies on drivers. The operating system then uses these drivers to ensure correct operation of each device.

Memory Management

All computers have random access memory, or RAM. Unlike hard drive storage, which is relatively permanent, RAM is what remembers everything you're doing in the moment. If you have a browser, photo editor, music program, and messaging application open, all of your progress and the status of each are stored in the RAM. The operating system works with your RAM sticks to control how much memory is used by each application, including the OS itself.

CPU Control

Your computer's processes are executed by its central processing unit, or CPU. Signals sent to and from the CPU determine what happens, and in what order. The operating system works with the CPU to create a checklist of processes to execute and ensures that each gets done. A CPU can only perform one task at a time; because CPUs are so incredibly fast, it gives the illusion of many simultaneous tasks. The operating system controls the priority of each task and sees them through to completion.

Fans and Cooling

One of the most important components of your computer is its cooling system. The CPU fan keeps the CPU from overheating in moments of high stress. Overheating can cause permanent damage to a CPU. The operating system communicates with both the CPU and the fan to help ensure the PC stays cool. This process is also assisted by the motherboard's internal controls, known as the BIOS, and can be overwritten by applications running in the OS.

You might be interested in
In the u.s.all financial institutions are required to conduct business at a physical location only
Ad libitum [116K]

Answer:

The answer is false.

Explanation:

5 0
3 years ago
Where is the typical location of a touchpad inside of a laptop?
butalik [34]

Answer:

Attached to the keyboard

Explanation:

Touch pad is the type of the mouse that is located on the laptop just near the keyboard or we can say that it is attached to the keyboard of the laptop. It has almost two buttons that are used for the purpose of Left and Right Click.

The touch pad is used to move the cursor to the required position on the screen of the laptop. This will work by just moving figure on the touch pad as the cursor move on the screen in the same direction of the finger..

5 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
A video consists of a sequence of:
PolarNik [594]
A) Frames. Is the anwser!!
4 0
2 years ago
Whats the next lyric,i baked you a pie,pie,pie
eduard
“oh boy what flavor”
4 0
3 years ago
Read 2 more answers
Other questions:
  • The most effective way to perform data entry is to keep your hands on the keyboard and press to move to the text cell in the row
    10·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • Whats your favorite sport between these options?
    12·2 answers
  • Is this statement true or false?
    11·1 answer
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • Name TanushSAVAGE. As given in the picture, Subscribe!
    15·1 answer
  • A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
    12·1 answer
  • Place the steps in order for creating a Custom Search Folder in Outlook 2016.
    9·2 answers
  • What is the name of the device protected by a digital certificate?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!