1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
15

What is the full form of the OS?​

Computers and Technology
2 answers:
Marysya12 [62]3 years ago
8 0

Answer:

OS: Operating System

The operating system performs all the basic tasks of any computer or mobile, such as memory management, file management, input and output handling, process management, etc.

Explanation:

harina [27]3 years ago
6 0

<em>OS</em><em> </em><em>stands</em><em> </em><em>f</em><em>or</em><em> </em><em>Operating</em><em> </em><em>System</em><em>.</em><em>.</em><em>.</em><em>…</em><em>…</em><em>…</em><em>…</em><em>…</em><em>…</em><em>…</em>

You might be interested in
When you expand the virtual size of a game, what do you create?
dangina [55]
I think the answer is c
3 0
3 years ago
MCQ: Which of the following network is confined to a relatively small area?
kobusy [5.1K]

Answer:

<em>D Lan</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em>

3 0
2 years ago
Read 2 more answers
Use the arr field and mystery () method below.
kolezko [41]

Answer:

The sum of all positive even values in arr

Explanation:

We have an array named arr holding int values

Inside the method mystery:

Two variables s1 and s2 are initialized as 0

A for loop is created iterating through the arr array. Inside the loop:

num is set to the ith position of the arr (num will hold the each value in arr)

Then, we have an if statement that checks if num is greater than 0 (if it is positive number) and if num mod 2 is equal to 0 (if it is an even number). If these conditions are satisfied, num will be added to the s1 (cumulative sum). If num is less than 0 (if it is a negative number), num will be added to the s2 (cumulative sum).

When the loop is done, the value of s1 and s2 is printed.

As you can see, s1 holds the sum of positive even values in the arr

7 0
3 years ago
Is used to process certificates and private/public key information?
Luda [366]
<span>SSL is used to process certificates and private/public key information. </span>SSL stands for Secure Sockets Layer. It is cryptographic protocols <span> that creates a trusted environment and </span>provides communications security over a computer network. The SSL protocol is used for establishing encrypted links between a web server and a browser.
4 0
3 years ago
Is microsoft word the same as microsoft office?
ycow [4]
Hey there!

Microsoft Word is considered a part of Microsoft Office. Office is a package of Microsoft applications that can be used on Windows or MacOS that includes Word, PowerPoint, Excel, Outlook, and many other programs used for either personal or commercial use. Microsoft Word is just one of those programs, so, no, they're not the same thing. 

Hope this helped you out! :-)
3 0
3 years ago
Read 2 more answers
Other questions:
  • On Gmail, can I have an email get sent to someone at a certain time?
    7·1 answer
  • Write thanks to the IT teacher at the end of grade 5
    7·1 answer
  • When assembling a desktop computer you should always install the drives before the motherboard?
    9·1 answer
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • Do people answer questions more on this site or be on social more ??? no right or wrong answer your opinion
    6·1 answer
  • Information is best described as
    10·1 answer
  • Blood Alcohol Level (BAL) is the ratio between the alcohol consumed and the blood in the body. A. True B. False
    12·2 answers
  • Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use
    6·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
  • Given a list of syntax errors from a compiler, a programmer should focus attention on which error(s), before recompiling?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!