1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
7

Why do we need operating systems?

Computers and Technology
1 answer:
Dvinal [7]3 years ago
7 0

NO NOSE PORQIE JExplanation:

You might be interested in
A database is used instead of a spreadsheet when?
Luba_88 [7]
Lists involve date with multiple themes. 
5 0
3 years ago
Steps to copy and paste text/information from website to Ms-word using keyboard​
Greeley [361]

Answer: Highlight the text you want to copy. Use the shortcut key combination Ctrl + C on a PC or Command + C on a Mac to copy the text. Move the text cursor to where you want to paste the text. Press Ctrl + V on a PC or Command + V on a Mac to paste the text

Explanation:

just copy and past by highlighting the text you want and clicking ctrl and c at the same time then ctrl and v to put it on word

8 0
2 years ago
If an internet document identifies its author but says nothing about her or his qualifications, your textbook recommends that yo
PSYCHO15rus [73]

If the internet document identifies the author, the textbook recommends that you type the author's name into the internet search box.

<h3>What is an internet document?</h3>

These are those documents that are gotten from the a search on the internet. To cite such items there are certain guidelines that are to be followed.

A simple search on a search engine would show you the most important details that this author possesses.

Read more on internet documents here:

brainly.com/question/14715750

5 0
3 years ago
West Point Bridge Designer | Does anyone know a way to make this bridge cost less?
e-lub [12.9K]
Make the zig zag part more spaced out
4 0
3 years ago
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
Inessa [10]

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

3 0
3 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • Which type babshshshhsshshhshshshhshs
    13·1 answer
  • What is an (CR) Optical character recognition?
    13·2 answers
  • What are some consequences of internet addiction​
    9·1 answer
  • How to copy single slide to powerpoint
    15·1 answer
  • What does my name look like in binary code, btw my mane is Wendy Alexis Morales
    10·2 answers
  • Software enables users to create documents
    13·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • Let’s say you’re having trouble locating a file on your computer. Which of the following are good places to look for the file?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!