1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
2 years ago
6

What are the three main desktop operating systems used today

Computers and Technology
1 answer:
Norma-Jean [14]2 years ago
3 0

Answer:The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux.

Explanation:

You might be interested in
Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
docker41 [41]

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

6 0
3 years ago
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices qu
Vladimir [108]

Answer:

Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.

4 0
2 years ago
How would I view the ruler on my document if it was not visible
svlad2 [7]
For MS Word 2010 and higher
Go to "View" and find checkbox "Ruler"
8 0
4 years ago
write an algorithm that reads to values, determines the largest value and prints the largest value with an identifying message ​
REY [17]

Answer:

I'm unsure of what language you are referring to, but the explanation below is in Python.

Explanation:

a = int(input("Input your first number: "))

b = int(input("Input your second number: "))  

c = int(input("Input your third number: "))

maximum = max(a, b, c)

print("The largest value: ", maximum)

6 0
3 years ago
List four examples of soft and hard skills
emmainna [20.7K]

Answer:

Explanation:

soft skills

1 – Communication. ...

2 – Teamwork. ...

3 – Adaptability. ...

4 – Problem-Solving. ...

hard skills

Technical Skills

Computer Skills

Analytical Skills

Marketing Skills

8 0
3 years ago
Read 2 more answers
Other questions:
  • •What are some conflicts between humans and machines that have arisen in the past?
    14·1 answer
  • The ____ category of apps makes the computer easier for blind people to use.
    9·1 answer
  • Microsoft excel is a __________ application.
    5·1 answer
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • Hello everyone. I need help. C programming. Create at least two more functions except the main () function to collect them.
    5·1 answer
  • Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl
    11·1 answer
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • You want to add a new Product and Services entry to your client's QuickBooks Online company. The service is installation of a se
    12·1 answer
  • A _____ is a computer that is deliberately set up to be easily hacked into.
    10·1 answer
  • How to transfer bookmarks to new computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!