1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
15

Which of the following is not an operating system service?

Computers and Technology
1 answer:
skad [1K]3 years ago
5 0

Answer:

c. graphical user interface

Explanation:

An operating system may be defined as the system software which manages the various computer hardware, resources, software and also provides other computer services. It communicates the user with the computer and the computer runs according to the instruction provided by the operating system. It is commonly known as the OS.  

Operating system does not provide any graphical user interface. It consists of necessary components of the software to facilitate the usage or running of the computer.

You might be interested in
In wheat, kernel color is determined by additive alleles at two unlinked loci. If two plants, one with dark red kernels (+++– ge
Shalnov [3]

Answer:

50 %

Explanation:

Alleles in dark red kernels:  ++ and +-

Alleles in light red kernels:  +- and --

genetic cross will result in off springs: +++- ; ++--, +-++,  +-+-

Hence 50% offspring will have phenotypes different from parental colors

5 0
3 years ago
What permissions should you assign a group if you want the group to have the ability to read, add, delete, execute, and modify f
ratelena [41]

Answer:

Modify is the correct answer to the following question.

Explanation:

If any person or user wants to read, delete, modify and execute the files then they have required the Modify permission. In other words, Modify permission provides the user to modify and delete the following files but they unable to delete subfolders because of the following permission.  

If they want then they have to change the permission by click right button from the mouse on the file or the folders which they want to change and then click on the properties from there they can change the permission.

7 0
4 years ago
A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. th
denis-greek [22]

In the case above, Machine Learning technology could be combined with the current solution.

<h3>How will Machine Learning help?</h3>

Machine Learning is known to be a tech that can help to streamline the bank operations  in terms of receiving and processing checks/cheques.

Therefore, In the case above, Machine Learning technology could be combined with the current solution.

Learn more about Machine Learning  from

brainly.com/question/25523571

#SPJ1

3 0
2 years ago
A computer processes data using only 1s and 0s.<br><br> A.True<br><br> B.False
stiks02 [169]
True. That data is called binary
4 0
4 years ago
A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have bee
Svet_ta [14]

Answer:

The next step to consider is updating the system's network settings

Explanation:

The next step after testing and verifying that the network patch cable and network interface card are working is to update the network settings to recent configurations.

Updating the system's network include settings of network adapter, LAN / Wi-Fi and TCP/IP.

Looking into your network settings is one of steps of effectively troubleshooting a system's network.

Few settings you could update are

1. LAN settings

2. TCP/IP network protocol properties

3. Network adapter settings

4. Internet connection

Effectively, updating the network settings is the next step. Few things to take note of when updating the network settings are

1. Create Standard Configurations for Device Classifications

2. Maintain the Current and Previous Network Configurations

3. Keep Track of Changes

4. Lastly, Document Network Changes

8 0
4 years ago
Other questions:
  • Given a variable n refers to a positive int value, use two additional variables, k and total to write a for loop to compute the
    13·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing
    14·1 answer
  • What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
    13·1 answer
  • A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
    8·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • Which statement best compares routers and hubs?
    9·1 answer
  • Using simplified language and numbers, using large font type with more spacing between questions, and having students record ans
    9·1 answer
  • Malware is any malicious software installed on a computer or network without the owner’s knowledge.
    10·1 answer
  • What are the advanced file and folder search commands?PLEASE GUYS ITS IMPORTANT
    12·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!