1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
4 years ago
9

Which of the following is not an operating system?

Computers and Technology
1 answer:
Tanzania [10]4 years ago
7 0
D. Internet Explorer is a web browser application.
You might be interested in
Networks that are designed to connect similar computers that share data and software with each other are called:_______
sergij07 [2.7K]

Networks that are designed to connect similar computers that share data and software with each other are called: Peer to Peer (P2P) Networks.

<h3>What is a networking software?</h3>

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

<h3>The types of networking software.</h3>

Generally, there are three main types of networking software and these include the following:

  • Security software
  • Connection software
  • Transport software

In Computer networking, Peer to Peer (P2P) Networks can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

7 0
2 years ago
In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
Lilit [14]

Answer:

ansList =input().split() #get input and split it by space

ansList = [int(i) for i in ansList if int(i)>0] #turn string to integer,and get all positive integers

print(ansList)

Explanation: I think this would work for you. I leace comments in the answer.

3 0
2 years ago
Explain the major innovation made from the establishment of abacus to present 5th computer generation.
ikadub [295]

Answer:

  1. Calculation using fingers
  2. Abacus (6th century BC)
  3. Sieve of Eratosthenes (3rd century BC)
  4. Napier bones
  5. slide rule
  6. Schikard's calculating clock with gears
  7. Pascaline
  8. Stepped reckoner by Leibniz
  9. Jacquard loom
  10. Mechanical computation machines (19th century)
  11. Analog computers (first half of 1900-1940)
  12. Digital computers (1940-1970)
  13. Computers with Microprocessors (1970 onwards)
  14. Smartphones (1992 onwards)

6 0
3 years ago
Which of the following is computer memory that works while the computer is turned on?
Crazy boy [7]

Answer:

Ron is the answer

Explanation:

In that sense it is similar to secondary memory, which is used for long term storage. When a computer is turned on, the CPU can begin reading information stored in ROM without the need for drivers or other complex software to help it communicate.

5 0
3 years ago
What property of semi-metals is useful in the computer industry?
artcher [175]
The answer is (a. Semi-conducting)
In the computer industry, semi-metals with a semiconducting property are useful in making of semiconductors. These metals have high resistance but lower than compare to insulators. This conductor could be crystalline or amorphous solids.
4 0
3 years ago
Other questions:
  • What is a device driver?
    9·2 answers
  • What is an example of asynchronous communication
    7·1 answer
  • Write a single c statement to read an integer from the keyboard and assign it variable "num"
    6·1 answer
  • Write a Java program that generates a random number between 0 and 50. Then, the program prompts for guesses until the user is co
    14·1 answer
  • How long after you install a new toilet until you can use it?
    15·1 answer
  • The word biodegradable on a label doesn't necessarily mean a product is environmentally safe?
    12·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • How can I, fill the application form for jobs. [such as Macdonal's jobs].?
    12·1 answer
  • Write down the different types of testing with their definition.
    11·1 answer
  • When developing an output control system, it is important to implement output standards that: (Choose all that apply.)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!