1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
14

How does the OS used and the specific applications on the system impact selection of a file management system?

Computers and Technology
1 answer:
sweet [91]3 years ago
7 0

Answer:

Explanation:

The functions of a file manager include the following.

The ability to format and copy disks

Listing of files in a storage channel.

A regular routine check of space used and unused space in the storage device.

The ability to organize, copy, move, delete, sort, or create shortcuts.

Storage and retrieval of data for the storage device. etc

In contrast, the system has some of the following functions.

Assigning queued document numbers for processing- Applications and Operating system dependent

Owner and process mapping to track various stages of processing - Operating system dependent

Report generation - Applications and Operating system dependent

Status - Operating system dependent

Create, modify, copy, delete, and other file operations - Operating system dependent

We can thereby conclude that file management system is dependent on OS and specific applications.

You might be interested in
(09 MC)How can understanding your own personality improve your relationships with others?
Mars2501 [29]
B.) is what most employers are looking for
5 0
2 years ago
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
2 years ago
What materials where used to make the first gps
8090 [49]
You need a radio transmitter that transmits some kind of radio wave signal, and an array of satelites to compare the postion to other parts of the world.
Hope this helps!
8 0
3 years ago
While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is
maxonik [38]

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

6 0
3 years ago
A batholith is an example of a(n) _____ igneous rock (one of the two main igneous rock groups).
Naily [24]
A batholith is an intrusive igneous rock.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the opportunity cost of computers when moving from point A to point B? -15 DVDs b. What is the opportunity cost of compu
    13·1 answer
  • People often delete or read email based upon the subject line alone select one:
    10·2 answers
  • Write the include directive that allows use of the function headers in the file myFuncs.h.
    13·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • While working a night job at a call center, Eric creates an app called EatOut, which can be used to place orders at restaurants,
    14·1 answer
  • You received a call form a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
    12·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • I need help ASAP 66 points this is a lab in Testout For Microsoft access I have been at this for about an hour
    10·1 answer
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!