1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
2 years ago
6

Which Operating System is used most often in households?

Computers and Technology
2 answers:
-Dominant- [34]2 years ago
4 0
Windows because there are way more pc then Mac
pshichka [43]2 years ago
3 0

Answer:

Windows

Explanation:

Windows are one of the most popular household os.

You might be interested in
MATH PLZ HELP ITS DUE IN 4 MINUTES​
zheka24 [161]

Answer:

2

Explanation:

8 0
3 years ago
Read 2 more answers
Which header will be the largest?<br><br> Hello<br><br> Hello<br><br> Hello<br><br> Hello
geniusboy [140]

Answer:  

Bye

bye

bye

bye

Explanation:

4 0
3 years ago
Read 2 more answers
Question 11. Assume that you want to copy and paste some range with values and number formats. Which radio button you should sel
Tcecarenko [31]

Answer:

i had the same qustion

Explanation:

8 0
3 years ago
Read 2 more answers
Inheritance enables an object, called a _____, to derive one or more of its attributes from a parent.
jarptica [38.1K]

Answer:

The answer is C.) child

I hope this helps! ^-^

6 0
2 years ago
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
Other questions:
  • "how do we store information in long term memory?"
    12·1 answer
  • It takes 2 seconds to read or write one block from/to disk and it also takes 1 second of CPU time to merge one block of records.
    10·1 answer
  • What command displays a computer s network settings?
    5·1 answer
  • Write a Comparator that compares String objects by the number of words they contain. Consider any nonwhitespace string of charac
    15·1 answer
  • You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo
    7·1 answer
  • What does this mean??
    11·2 answers
  • The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
    10·1 answer
  • How do you remove a key cap without a kaycap remover (keyboard keycap) ​
    11·1 answer
  • Four ways to improve the performance of a hard disk include.
    8·1 answer
  • How would you use keywords and Boolean operators to help you with a web search?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!