1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
2 years ago
6

What are the different types of computer operating systems?

Computers and Technology
1 answer:
MissTica2 years ago
3 0

Answer:Apple iOS. Apple's iOS is a popular operating system for smartphones. ...

Microsoft Windows. ...

Apple MAC OS. ...

Linux Operating System. ...

Real-Time Operating System. ...

Normal Operating System.

Explanation:

You might be interested in
Does two core processors mean that it is twice as fast do you agree? why?
vlabodo [156]

Answer:

the friendships the following link and fill out our related information

Explanation:

consisting of a new one of the cell number of people who want

3 0
3 years ago
What is a database query?
lana [24]
C.a form used to create a new tables for the database
8 0
3 years ago
Read 2 more answers
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
galben [10]

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

5 0
3 years ago
The EDI ____________layer describes the business application that i
suter [353]

Answer:

a) EDI Semantic Layer

Explanation:

EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.

This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.

Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).

6 0
3 years ago
What online game do you play on the internet and can I play with you on it? I play downtown mafia 1960
SashulF [63]

Answer:

None

Explanation:

I find them scary and they give me nightmares

6 0
2 years ago
Other questions:
  • Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
    5·1 answer
  • Create a Rational number class in Java using the same style as the Complex number class created in class.(The in class example c
    12·1 answer
  • the equation t= 0.25d^1/2 can be used to find the number of seconds, t, that it takes an object to fall a distance of d feet how
    8·1 answer
  • Grace Hopper led the development of ______, a programming language for business applications.
    6·2 answers
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • What is a orogram to block access to websites
    15·1 answer
  • g Design a Boolean function called isPrime, that accepts an integer as an argument and returns True if the argument is a prime n
    14·1 answer
  • A basic program to find the area of a square​
    6·1 answer
  • he superclass Student contains: a constructor that accepts a String corresponding to the name of the school the student attends
    15·1 answer
  • The startup routine runs,when machine boots up is known as​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!