1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
2 years ago
10

B. Differentiate Operation System from other software. give me 4-5 sentences pls.

Computers and Technology
2 answers:
borishaifa [10]2 years ago
8 0

Answer:

it is a

Explanation:

i did the test

belka [17]2 years ago
5 0

Answer:

An operating system or OS is system software that manages computer hardware, software resources, and provides common services for computer programs. All operating systems are system software. Every desktop computer, tablet, and smartphone includes an operating system that provides basic functionality for the device while on the other hand The System software is a type of computer program that is designed to run a computer’s hardware and application programs it controls a computer’s internal functioning, chiefly through an operating system. It also controls peripherals devices such as monitors, printers, and storage devices.

Explanation:

You might be interested in
How many times go you need to click the format painter button to apply copied formats to multiple paragraphs one right after the
Umnica [9.8K]
Double click would be enough
6 0
2 years ago
Read 2 more answers
The function keys are labeled from f1 to wat
Fed [463]
If we are talking about a simple North American Keyboard, The answer would be F1 to F12
Hope this Helps!!!
8 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The
USPshnik [31]

Answer:

d. A web analytic

Explanation:

Web analytic measure activity and behavior of a user on a website, for example: how many users visit, how long they stay, how many pages they visit, which pages they visit, and whether they arrive by following a link or not.

Ordinal data is a categorical, statistical data type where the variables have natural, ordered categories and the distances between the categories is not known.

Dependent variable rely on another variable to get a value

Independent variable are variable which can be gotten on their own without relying on another variable.

7 0
3 years ago
Russian newspaper says U.S. journalism is conducting 'experiments' to introduce fast-growing artificial intelligence technology.
Marina86 [1]

Answer:

Russian newspaper says U.S. journalism is conducting 'experiments' to introduce fast-growing artificial intelligence technology.

Explanation:

Artificial intelligence (AI) is a wide-ranging tool that enables people to rethink how we integrate information, analyze data, and use the resulting insights to improve decision making—and already it is transforming every walk of life. In this report, Darrell West and John Allen discuss AI's application across a variety of sectors, address issues in its development, and offer recommendations for getting the most out of AI while still protecting important human values.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Liza works as a receptionist. Around the lunch hour, she has a difficult time hearing the callers due to employees talking near
    12·1 answer
  • What document type would be best to communicate sales items from a business to potential customer?
    12·1 answer
  • How many data bits are sent in a single psk31 character?
    15·1 answer
  • When planning a presentation, there are several factors you need to consider. Which of the following is one factor you should co
    8·1 answer
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • Jack has a fear of getting up in front of a group of people and giving a presentation. When he gave his last presentation, he ta
    5·2 answers
  • During a test, it is generally best to: A. answer all questions in order B answer the essay questions first C. answer the least
    7·2 answers
  • To move an object to the bottom of the stack, click the Send Backwards arrow and then click Send to Back in the Arrange group on
    7·1 answer
  • How many cubic millimeters are present in 0.0923 m3?​
    14·1 answer
  • Will economists be replaced by artificial intelligence?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!