1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
13

Describe how an operating system interacts with the computer.

Computers and Technology
2 answers:
enyata [817]3 years ago
6 0
The user requests an application to run by making a system call to get it started
erica [24]3 years ago
3 0

An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. ... In addition, users can interact directly with the operating system through a user interface such as a command line or a graphical user interface (GUI).Operating system is like a nervous system and the processor is brain.

Drivers

In order for the operating system to talk to your hardware, it needs drivers. Drivers teach the operating system to interact with each bit of hardware. Graphics cards, sound cards, networking cards, USB peripherals, and everything else you connect to your computer relies on drivers. The operating system then uses these drivers to ensure correct operation of each device.

Memory Management

All computers have random access memory, or RAM. Unlike hard drive storage, which is relatively permanent, RAM is what remembers everything you're doing in the moment. If you have a browser, photo editor, music program, and messaging application open, all of your progress and the status of each are stored in the RAM. The operating system works with your RAM sticks to control how much memory is used by each application, including the OS itself.

CPU Control

Your computer's processes are executed by its central processing unit, or CPU. Signals sent to and from the CPU determine what happens, and in what order. The operating system works with the CPU to create a checklist of processes to execute and ensures that each gets done. A CPU can only perform one task at a time; because CPUs are so incredibly fast, it gives the illusion of many simultaneous tasks. The operating system controls the priority of each task and sees them through to completion.

Fans and Cooling

One of the most important components of your computer is its cooling system. The CPU fan keeps the CPU from overheating in moments of high stress. Overheating can cause permanent damage to a CPU. The operating system communicates with both the CPU and the fan to help ensure the PC stays cool. This process is also assisted by the motherboard's internal controls, known as the BIOS, and can be overwritten by applications running in the OS.

You might be interested in
What does a file association specify?
Olenka [21]

Answer:

The answer is D

Explanation:

file association associates a file with an application capable of opening that file. More commonly, a file association associates a class of files with a corresponding application.

4 0
3 years ago
Read 2 more answers
The primary stream fed by tributaries within a dendritic drainage network is termed a ________ stream
a_sh-v [17]
<span>TRUNK. In a dendritic system, there are many smaller rivers or streams (the "twigs" of the tree), which are then merged into the tributaries of the main river (the branches and the trunk of the tree, respectively). They tend to develop in V-shaped valleys</span>
6 0
4 years ago
On the Direct Marketing worksheet, create appropriate range names for Design Fee (cell B8), Cost Per Ad (cell B9), Total Clicks
Inessa [10]

Answer:

See explanation below

Explanation:

Named ranges are a very important tool in Microsoft Excel. It is used in assigning a name to a particular number of cells. It is great for automation and makes formula much easy to understand and use.

One way to create named ranges is theory the Name Box.

To create named ranges in the design marketing sheet we do this;

1) We click on cell B8 and then navigate to the name box at the top right corner of the sheet just above the column A.

•The name box is where the cell address of any cell that is active is displayed.

•You would see that “B8” is displayed on the name box.

• Double click on the name box and type in the appropriate name, in this case - Design_Fee.

• Press enter and you have your named range.

You do the same for the other named ranges.

Note that: Named ranges must contain letters, numbers or underscore.

4 0
3 years ago
Every workplace should have an emergency plan of action.
pochemuha

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

6 0
3 years ago
Read 2 more answers
Which line of code will only allow a symbol to be stored in a variable?
nataly862011 [7]
<h2>Answer:</h2><h2></h2><h2>phone = int(input("What is your phone number?"))</h2><h2></h2><h2>Hope this helps, have a great day, stay safe, and positive!!</h2>

8 0
3 years ago
Read 2 more answers
Other questions:
  • Binary search requires that the data to search be in order.<br> True or false
    13·1 answer
  • Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable
    10·1 answer
  • Which protocol sends a request to view or download a website or file ​
    7·1 answer
  • Which of the following is true for an API?
    6·1 answer
  • please help no one is helping me on this one
    9·1 answer
  • Write a program to sort the (name, age, score) tuples by descending order where name is string, age and score are numbers. The s
    6·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
  • A wireless ________ extender is a network device that enhances transmission of your wireless signal.
    11·1 answer
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!