1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
6

What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon

on the desktop and selecting Properties from the menu. The line under System: tells you the name of your operating system. Enter the name of your OS in the space provided
Computers and Technology
2 answers:
lord [1]3 years ago
7 0

Answer

Chrome OS

Explanation:

i cant tell whether this is a question you c&p'd or if your genuinely asking people what os they're running

Viktor [21]3 years ago
5 0

Explanation:

hbbbbhygjjjjkllkkjhkkky

You might be interested in
QUIZLET Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer networ
anastassius [24]

Answer:Screening

Explanation:Packet screening is the process in which whenever a packet is received at the destination port, there is the examining of the packet.The examination of the packet rote from source to destination takes place. The screening takes place for evaluating that the data in the packet is adequate and carries no error that can risk in the security, tracks the routes  of the packet path etc.

5 0
3 years ago
Match these step-by-step directions in the order that you will find them in this course.
7nadin3 [17]

Answer:

1.Go to the View tab and select Watch.

2.Comparison

3.Editing

4.Drawing (I think)

5.Predesigned slides available for creating a new presentation

Explanation:

6 0
3 years ago
Types of Hazards Mitigation Measures
Fynjy0 [20]

Answer:

auto mechanics

Explanation:

keeps dirt and grease off hands

4 0
3 years ago
Read 2 more answers
Write function modifyString(origString, charsToReplace, count) that takes as input a string origString, a string charsToReplace,
laila [671]

Answer:

The code of the above program is provided below. using Python

Explanation:

<u>Code in Python 3:- </u>

def modifyString(origString,charsToReplace,count):

# Make s1 as original string

s1=origString

# Make s2 as charsToReplace string in lowercase

s2=charsToReplace.lower()

# Make s3 as charsToReplace string in uppercase

s3=s2.upper()

# Initialize answer as an empty string

ans=''

# Iterate the string upto length times

for i in range(len(s1)):

# check for chars in the string and append to the answer

if (s1[i] in s2) or (s1[i] in s3):

ans=ans+count*s1[i]

else:

ans=ans+s1[i]

# return the final string

return ans

print(modifyString("Our cat is funny","aeiou",5))    

print(modifyString("Our cat is funny","zu",3))

8 0
3 years ago
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
Other questions:
  • How do you do these questions? The first two questions could have multiple answers and the third is one answer only.
    7·1 answer
  • True or false: although the first personal computers were available as early as the 1970's, the creation of the world wide web (
    11·1 answer
  • This chapter uses the class rectangleType to illustate how to overload the operators +, *, ==, !=, &gt;&gt;, and &lt;&lt;. In th
    15·1 answer
  • A newer kind of mobile site can do a lot of what only apps used to do, so the line has blurred between sites and apps. what are
    9·1 answer
  • Write a Java Program that can compute the mean, median, the highest, and the lowest of the students’ scores in a class. First, t
    6·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • What does Nicholas Carr suggest in his article "Is Google Making Us
    7·1 answer
  • Instructions
    15·1 answer
  • Accept total number of participants (B) in class. A group of
    12·1 answer
  • Which of these is an example of an online workspace?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!