1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
6

What are the three main desktop operating systems used today

Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
3 0

Answer:The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux.

Explanation:

You might be interested in
What are two examples of items in Outlook?
marta [7]

Answer:

I believe it would be button and tool bar

8 0
3 years ago
Wat is a computer risk<br>​
klemol [59]

Answer:

Virus, cyber theft

Explanation:

A computer risk is something that can potentially harm your data on your computer or harm you through a computer by using theft tactics from real people to autonomous viruses making it to your computer and slowing your computer. With cybrrtheft thieves can get personal info through accounts to pictures and payment information.

4 0
4 years ago
Read 2 more answers
A construction-based client would like to develop an application that can analyze an image of machinery and overlay information
Elden [556K]

A form of Extended Reality which can best assist the client with information on the repair is: 3. Augmented Reality.

<h3>What is Extended Reality?</h3>

Extended reality refers to an umbrella terminology that is used to describe all real and virtual physical environments (realities) and human-machine interactions through the use of computer technologies and wearables.

<h3>The forms of Extended Reality.</h3>

In Computer technology, there are four (4) main types of Extended Reality and these include:

  • Mixed Reality
  • Haptic Reality
  • Virtual Reality
  • Augmented Reality

Augmented Reality is mainly applied in maintenance and repair by analyzing an image of machineries and provide information that will assist in the repair process.

Read more on Augmented Reality here: brainly.com/question/9054673

4 0
3 years ago
Company ABC has always used passwords to protect the highly confidential information in their company. Recently, someone who was
Leno4ka [110]
Company ABC should use passwords but also have them use a code so that not just anyone can get in. Kinda like facebook.
3 0
3 years ago
Anyone have Y.O.U.T.U.B.E or S.O.U.N.D.C.L.O.U.D. I need help putting my music and videos out there
kiruha [24]

Answer:

I do have Y.O.U.T.U.B.E.

Explanation:

1. Go on Y.O.U.T.U.B.E app.

2. Create account or log in to an existing account.

3. In the welcome screen, click the button of a camera on the top right corner next to your photo icon.

4. Click "Upload Video"

5. Then upload your video.

6. Add a description and details

7. Done! Just upload to on Y.O.U.T.U.B.E.

I hope this helps! Thank you:)

5 0
4 years ago
Other questions:
  • If the task is to write firewall specifications for the preparation of a(n) ____, the planner would note that the deliverable is
    14·1 answer
  • Kylie has created some code designed to keep track of information about employees at a company. The code will be used by the com
    6·1 answer
  • Which utility would you use to return the common name of the computer you're at? Execute this command and submit screen shots.
    11·1 answer
  • Write the definition of a class Clock. The class has no constructors and three instance variables. One is of type int called hou
    12·1 answer
  • The letters LAN stand for Area Network.
    9·2 answers
  • 9. Which of the following commands is executed with the shortcut 'Ctrl+Z'?
    11·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
  • How do you flatten a 2D array to become a 1D array in Java?
    12·1 answer
  • Which operating system is used by most the supercomputer system in the world
    9·1 answer
  • Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!