1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
11

What are the functions of operating systems

Computers and Technology
2 answers:
DanielleElmas [232]3 years ago
6 0

Answer:

Important functions of an operating System:

Security – ...

Control over system performance – ...

Job accounting – ...

Error detecting aids – ...

Coordination between other software and users – ...

Memory Management – ...

Processor Management – ...

mina [271]3 years ago
5 0

Explanation:

<h2>(1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers.</h2><h2> (2) establish a user interface, execute .</h2><h2>3) It provide services for applications software.</h2>
You might be interested in
The running time of Algorithm A is (1/4) n2+ 1300, and the running time of another Algorithm B for solving the same problem is 1
Mnenie [13.5K]

Answer:

Answer is explained below

Explanation:

The running time is measured in terms of complexity classes generally expressed in an upper bound notation called the big-Oh ( "O" ) notation. We need to find the upper bound to the running time of both the algorithms and then we may compare the worst case complexities, it is also important to note that the complexity analysis holds true (and valid) for large input sizes, so, for inputs with smaller sizes, an algorithm with higher complexity class may outperform the one with lower complexity class i.e, efficiency of an algorithm may vary in cases where input sizes are smaller & more efficient algorithm might be outperformed by the lesser efficient algorithms in those cases.

That's the reason why we consider inputs of larger sizes when comparing the complexity classes of the respective algorithms under consideration.

Now coming to our question for algorithm A, we have,

let F(n) = 1/4x² + 1300

So, we can tell the upper bound to the function O(F(x)) = g(x) = x2

Also for algorithm B, we have,

let F(x) = 112x - 8

So, we can tell the upper bound to the function O(F(x)) = g(x) = x

Clearly, algorithmic complexity of algorithm A > algorithmic complexity of algorithm B

Hence we can say that for sufficiently large inputs , algorithm B will be a better choice.

Now to find the exact location of the graph in which algorithmic complexity for algorithm B becomes lesser than

algorithm A.

We need to find the intersection point of the given two equations by solving them:

We have the 2 equations as follows:

y = F(x) = 1/4x² + 1300 __(1)

y = F(X) = 112x - 8 __(2)

Let's put the value of from (2) in (1)

=> 112x - 8 = 1/4x² + 1300

=> 112x - 0.25x² = 1308

=> 0.25x² - 112x + 1308 = 0

Solving, we have

=> x = (112 ± 106) / 0.5

=> x = 436, 12

We can obtain the value for y by putting x in any of the equation:

At x=12 , y= 1336

At x = 436 , y = 48824

So we have two intersections at point (12,1336) & (436, 48824)

So before first intersection, the

Function F(x) = 112x - 8 takes lower value before x=12

& F(x) = 1/4x² + 1300 takes lower value between (12, 436)

& F(x) = 112x - 8 again takes lower value after (436,∞)

Hence,

We should choose Algorithm B for input sizes lesser than 12

& Algorithm A for input sizes between (12,436)

& Algorithm B for input sizes greater than (436,∞)

8 0
3 years ago
A time-saving strategy that helps define unfamiliar words involves using
yuradex [85]

The correct answer is A. Familiar words for clues

Explanation:

Finding unfamiliar words is common while reading, especially in texts that belong to a specific field such as medicine, technology, etc. This can be handled through multiple strategies such as using a dictionary, guessing the meaning of the word based on its parts, and using context clues.

In this context, one of the easiest and most time-saving strategy is the use of context clues that implies using the familiar words as clues to guess the meaning of an unfamiliar word. This is effective because in most cases the meaning of an unknown word can be determined using the context of the word or words around the unknown word. Also, this strategy takes little time because you only need to analyze the sentence or paragraph where the unknown word is. Thus, the time-saving strategy to define unfamiliar words involves using familiar words for clues.

6 0
3 years ago
Read 2 more answers
In the belt drive mechanism, what happens when the belt is crossed instead of open?
KengaRu [80]
They will spin in the opposite direction because the belts are twisted.
8 0
3 years ago
Why are pirated software considered a threat?​
densk [106]

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

<h3>What are the disadvantages of using pirated software?</h3>

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

brainly.com/question/3615098

#SPJ1

6 0
2 years ago
this weekend you areplanning to complete part of your assignment at the library to do this you need to store data on a removable
Archy [21]
A flash drive, it can be put into a USB port and the computer will register it and you should be able to pull up anything you store on it on a another computer or device you are using.

4 0
3 years ago
Other questions:
  • If you delete a view, account administrators can recover the view using the "trash can" function within how many days?
    7·2 answers
  • Give the type and value of each result of the following Java expressions.
    14·1 answer
  • You are designing a wireless network for a client. your client needs the network to support a data rate of at least 54 mbps. in
    10·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • Path of the signal of television
    6·1 answer
  • Annie wants to create a polka-dot pattern. She wants the dots to be distributed evenly in her pattern. She has turned on the gri
    10·1 answer
  • Samuel loves playing the violin, but he feels embarrassed after a classmate posts a video on a social networking site making fun
    6·2 answers
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • What is the one common feature that ties together different social media technologies
    11·1 answer
  • Describe accessibility in Windows 7 ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!