1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
13

Software that interprets command from the keyboard and mouse is also known as?

Computers and Technology
1 answer:
melisa1 [442]3 years ago
6 0

Answer:

I believe the answer is, Operating System.

You might be interested in
Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
mariarad [96]

Answer:

Transport Layer

Explanation:

  • Transport Layer is responsible for host-to-host communications of applications.
  • OSI model has seven layers while other models like TCP/IP has four layers.
  • OSI model stands for Open Systems Interconnection.
  • The seven layers of OSI model architecture are the following starting from the Hardware Layers ( Layers in Hardware Systems ) to Software Layers ( Layers in Software Systems )
  1. Physical Layer
  2. Data link Layer
  3. Network Layer
  4. Transport Layer
  5. Session Layer
  6. Presentation Layer
  7. Application Layer
  • Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
  • Transport Layer is responsible for multiplexing, segmentation, flow control and host-to-host communication services.
8 0
4 years ago
A ____ is several programs simultaneously processing the same I/O stream.
Sonja [21]
Concurrent multiple program execution, opposite to pipeline execution where it needs to in a sequential or in order of execution. You can also say parallel process programming.
6 0
3 years ago
Read 2 more answers
Categorize the following relationships into generalization, aggregation, or association. Beware, there may be n-ary associations
Oksana_A [137]

Answer:

Answer explained below

Explanation:

a. A country has a capital city.------------ aggregation(city is part of country)

b. A dining philosopher uses a fork. ----------- association(philosopher and fork are different entities)

c. A file is an ordinary file or a directory file. ------- generalization( both ordinary and directory files are having attributes of files)

d. Files contain records.--------- aggregation( records are part of File)

e. A polygon is composed of an ordered set of points. ----------- aggregation( points are parts of polygon)

f. A drawing object is text, a geometrical object, or a group. --------- generalization( text and geometrical objects are drawing object)

g. A person uses a computer language on a project. -------- aggregation( person and computer language are part of project)

h. Modems and keyboards are input/output devices. -------- aggregation( Modems and keyboards both are I/O devices)

i. Classes may have several attributes.------- aggregation( attributes are part of classes)

j. A person plays for a team in a certain year. ----------- aggregation(player is part of team)

k. A route connects two cities. --------- aggregation( route consists of two cities)

l. A student takes a course from a professor. ----------- association( student and course are separate entities)

5 0
3 years ago
How long can a lightning last
Maru [420]
A lightning can last 30 microseconds.
8 0
4 years ago
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
Other questions:
  • Help PLEASE (in attachment)
    8·1 answer
  • Which of the following tasks can you perform using a word processor?
    12·1 answer
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • Select what's true about packet sniffers. Check All That Apply Legitimate sniffers are used for routine examination and problem
    15·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • Write a for loop that sets each array element in bonusScores to the sum of itself and the next element, except for the last elem
    11·2 answers
  • Which of the following is a trend in Internet computing? People are shifting back to using desktop computers more than mobile de
    5·2 answers
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • When a virtual machine is
    9·1 answer
  • how would you deploy network connectivity in the 25 classrooms, 12 faculty offices, and the common areas of the building?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!