1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
6

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo

r applications to run on. What is the features name?
Computers and Technology
1 answer:
mel-nik [20]3 years ago
5 0

Answer:

Kernel

Explanation:

The Kernel is the part of the operating system core which is responsible for controlling security, managing the file system, and providing a platform for applications to run on.

You might be interested in
Katie wants to use VLOOKUP for a column in a table. Which value of the mode parameter should she use to look for an exact match
Lapatulllka [165]

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Further Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

  • To achieve this, select a cell in your Excel worksheet
  • Type =VLOOKUP in the type bar of the Excel sheet
  • Select the value to look up and then select the data range
  • Type the column number that you want to search and then type FALSE
  • Press enter

Learn about VLOOKUP in Excel by clicking the links below

brainly.com/question/9579933

brainly.com/question/10686097

#LearnWithBrainly

4 0
3 years ago
Please help ASAP!
makkiz [27]
B. training is the correct answer
8 0
3 years ago
What is an example of value created through the use of deep learning?
vichka [17]

An example of value which is created through the use of deep learning is: b. reducing multi-language communication friction in a company through automatic language translation.

<h3>What is machine learning?</h3>

Machine learning (ML) is also known as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

In Machine learning (ML), data-driven techniques (methods) can be used to learn source ranges directly from observed multi-language communication.

In this context, we can infer and logically deduce that an example of value which is created through the use of deep learning is reducing multi-language communication friction that exist among employees working in a company through automatic language translation.

Read more on machine learning here: brainly.com/question/25523571

#SPJ1

8 0
2 years ago
Which magazine can help public determine best technology to buy
Dennis_Churaev [7]
Consumer report would help determine the best technology to buy.
4 0
3 years ago
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Other questions:
  • Widely spaced isobars often indicate ________.
    14·2 answers
  • Which tab is used to configure an export to PST in Outlook 2016?
    7·2 answers
  • You are going to write a program for Computer test which will read 10 multiple choice questions from a file, order them randomly
    11·1 answer
  • Write the definition of a method dashedLine, with one parameter, an int. If the parameter is negative or zero, the method does n
    8·1 answer
  • 4. Where do you find the command to create bibliography citations or a table of contents?
    14·2 answers
  • Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How m
    6·1 answer
  • How do you change the number of rows and columns displayed for an embedded Excel object on a PowerPoint slide?
    8·1 answer
  • Which of the statements below are true? Which are false?
    14·1 answer
  • You are the system administrator for Precision Accounting Services, which employs 20 accountants and 25 accounting assistants. T
    13·1 answer
  • What are three major events in computer science history?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!