1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
2 years ago
9

What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity

Computers and Technology
1 answer:
Anna71 [15]2 years ago
8 0

Answer:

Size

Explanation:

thats it thats the answer

You might be interested in
____ hack systems to conduct terrorist activities through network or Internet pathways
Advocard [28]

Answer:

Cyberterrorists

Explanation:

Cyberterrorists -

These are the people who illegally , without any authentication , are able access some other person's personal system or internet server , are referred to as cyber terrorists.  

Internet service is used in this process , which can lead to loss of life , harm , threat or some illegal practice.  

Hence, from the statement of the question,  

The correct term is cyberterrorists.

6 0
3 years ago
Mail merge can be used in business to complete which of the following tasks
Likurg_2 [28]

Answer:

Mail merge lets you create a batch of documents that are personalized for each recipient. For example, a form letter might be personalized to address each recipient by name. A data source, like a list, spreadsheet, or database, is associated with the document.

8 0
3 years ago
Read 2 more answers
How many hours did it take supercomputer to calculate pi?
dybincka [34]
35 hours to be exact
3 0
3 years ago
ASAP!!!! HELP, DON'T GUESS!!! Which options can be adjusted in the Print settings? (1) the font formatting, the sizes of images,
andrew-mc [135]

4. Everything else has to be adjusted before you enter print settings.

8 0
3 years ago
Read 2 more answers
By what date must federal taxes typically be filed and sent to the IRS?
marishachu [46]
April 15th of each annual year
6 0
3 years ago
Other questions:
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • Which of the following statements is true?
    5·1 answer
  • A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
    7·1 answer
  • Develop a plan to design and finally implement a set of functions using C++ that would implement the IEEE standard. Phase 1 will
    10·1 answer
  • Why is it difficult to convince top management to commit funds to develop and implement SIS
    5·2 answers
  • Can someone help me so I don’t fail this class:(
    14·1 answer
  • Given an initialized variable fileName, write a sequence of statements that create a file whose name is given by the variable an
    15·1 answer
  • Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.
    8·1 answer
  • 40 points for this question
    7·2 answers
  • Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!