1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
5

What are the basic tasks performed by an operating system?​

Computers and Technology
1 answer:
Kruka [31]3 years ago
3 0

Answer:

An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Explanation:

i hope it helps:)

You might be interested in
Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down c
DanielleElmas [232]

Fiber Internet is the wired choice of our present times. It has replaced traditional copper-based facilities.

<h3></h3>

How fiber optics are connected?

  • Fiber to the curb (FTTC) means your fiber connection goes to the nearest pole or utility box—not an actual concrete curb. After that, coaxial cables will send signals from the “curb” to your home. This means your connection is made up of part fiber-optic cables, part copper wires.
  • Twisted pair cabling simply refers to a wiring whereby two conductors that are gotten from a single circuit will be twisted together so that their electromagnetic compatibility can be enhanced.
  • This type of network cable is commonly used to connect office computers to the local network and it is used for Ethernet networks. A circuit is formed from the pair of wires which can be used in the transmission of data.
  • Fiber optic internet is a data connection carried by a cable filled with thin glass or plastic fibers. Data travels through them as beams of light pulsed in a pattern. Fiber optic internet speeds are about 20 times faster than regular cable at 1 Gbps.

To learn more about fiber refer to:

brainly.com/question/21808066

#SPJ4

5 0
1 year ago
Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
Yuri [45]

Answer:

# include<iostream>

#include<conio.h>

using namespace std;

main()

{

char choice;

cout<<"Enter your Choice"

cin>>choice;

switch (choice)

{

case 'y':

cout<<"Your request is being processed";

break;

case 'n':

cout<<"Thank you anyway for your consideration";

break;

case 'h':

cout<<"Sorry, no help is currently available";

default:

cout<<"Incorrect Choice";

break;

}

getch();

}

Explanation:

In this program, a character type variable named as choice is selected for the input. This choice variable can be y, n or h as per requirement of the program. Switch statement is chose for the selection of output statement with respect to its mentioned input.  This program shows the output statement for above mentioned characters. In case of any other character the program returns Incorrect choice and ends.

7 0
3 years ago
How does having constraints placed on a design change the engineering process
Delvig [45]
Having constraints on a design will change the engineering process and the process will take a long time to finish. The process eats up time, quality and budget especially when it involves prototypes and the like. Some common constraints involve the design itself and the engineer. 
8 0
4 years ago
Read 2 more answers
To create a cover letter to send to potential employers along with a resume, what software program should you use?
spayn [35]
Sending letters is easier when an individual is using an email. Emails are very easy to access, they can be sent twenty four / seven (24/7) and can also be received 24/7. Examples of email programs are yahoo and google websites.
3 0
3 years ago
• Why does a lunar eclipse last longer than a solar eclipse?
Wittaler [7]
The shadow cast by the earth is quite a bit larger than the moon
5 0
4 years ago
Other questions:
  • After a group sets a project schedule, members should be prepared to
    7·2 answers
  • For this exercise, you are given a phrase. Return the number of time the word “dog” appears in the phrase.
    7·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Please check my answer! (Java)
    6·1 answer
  • What application can be used to set windows 8 to boot into safe mode while still in windows?
    15·1 answer
  • Need help!! Write an interactive program that reads lines of input from the user and converts each line into "Pig Latin." Pig La
    9·1 answer
  • HELP!!!!!!!
    8·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
  • Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the suppli
    7·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!