1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
6

Which describes an operating system that is multitasking?

Computers and Technology
2 answers:
tatuchka [14]3 years ago
7 0
The answer is b. because A is using one at a time. C is trying to use 1 at a time.
viva [34]3 years ago
4 0
The answer is b but depending on your situation it could b c a computer is always multitasking in the background but when c happens usually too many things are writing to your disk at once and you need to switch a portion of your available disk space to that new program, a usually never happens unless you have a really bad computer and b is what usually happens when using a computer so again b is the answer but be careful when making that decision on a test if it gives you a scenario check the disk usage.

Hope this helped
You might be interested in
What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
Yuki888 [10]

Answer:

The Security Account Manager

Explanation:

The Security Account Manager (SAM), This is a database file found in Windows Operating Systems.... Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores users' passwords. It can be used to authenticate local and remote users. It is  an important and vital component of how Windows stores passwords locally on the computer.

5 0
3 years ago
What email server does Global Enterprises use?
harina [27]

Answer:

Global Enterprises uses an open source mail server called Courier.

Explanation:

6 0
3 years ago
Suppose we want to design a combinational logic block that accepts a 4 bit Binary number as input. Let the most significant bit(
labwork [276]

Answer:

I'm sorry I'd been looking at this question a while and I can't seen to figure it out.

3 0
3 years ago
Describe two measures that a school could take to ensure the security of the school network.
Zolol [24]

Answer:

Having a proper firewall that could prevent cyber attacks against black hat hackers, And having good cyber team that has had extensive training and know hows the network operates to ensure smooth sailing for the workers and students. (extra) Ensuring your staff understands the cyber war and knows not to click on malicious links that could allow a cyber crminal in to the network.

Explanation:

BlackHat- Individual that uses his knowlage of computers for malicious use.

Firewall- Enitial intrance into a computer it is a piece of software that have expressions to ensure you are only getting traffic that you have specified on the system and not allowing all traffic on all ports

5 0
3 years ago
Write a function float Average(int, int) that finds the mean, and then write a main program that inputs two numbers from the use
meriva

The program illustrates the use of functions.

Functions are used to group related code segments that act as one, when called.

The program in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

//This defines the Average function

float Average(int num1, int num2){

   //This returns the average of the numbers

   return (num1+num2)/2.0;

}

//The main method begins here

int main(){

   //This declares the numbers as integer

   int num1, num2;

   //This gets input for both numbers

   cin>>num1; cin>>num2;

   //This is repeated until the user enters 0

   while(num1!=0 || num2 !=0){

       //This calls the average function, and prints the average

       cout<<Average(num1,num2)<<'\n';

       //This gets input for both numbers, again

       cin>>num1; cin>>num2;

   }

   return 0;

}

Read more about similar programs at:

brainly.com/question/17378192

5 0
2 years ago
Other questions:
  • In 3–5 sentences, describe the unique challenges e-mail presents for business communications.
    13·2 answers
  • You run an automobile selling company that has a popular online store on AWS. The application sits behind an Auto Scaling group
    6·1 answer
  • How do i make the lines on a google sheets bar graph skinnier
    7·1 answer
  • Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
    9·1 answer
  • Which statement best describes the purpose of the Insert Function dialog box?
    13·1 answer
  • How do you make the task bar and e-mail read in larger print
    13·1 answer
  • A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page fr
    14·1 answer
  • Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
    10·1 answer
  • Rhea has been asked to interview the new CEO of an energy company. She has scheduled a meeting with him in the company’s meeting
    9·2 answers
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!