1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
6

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo

r applications to run on. What is the features name?
Computers and Technology
1 answer:
mel-nik [20]3 years ago
5 0

Answer:

Kernel

Explanation:

The Kernel is the part of the operating system core which is responsible for controlling security, managing the file system, and providing a platform for applications to run on.

You might be interested in
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
In order to generate a random number, you must use Math.random( ). Group of answer choices True False
Tanzania [10]

Answer:

False

Explanation:

While Math.random() can be used to generate a random number, Java programming language also has a class called Random in the java.util package which can be imported into your code. This is a more efficient way of generating random numbers (ints or doubles) as you can instantiate several random number generators. The following line of code creates an an object of the class Random and sets the bound to 10.

Random rand = new Random (10);

This will generate random number from 0-9.

5 0
4 years ago
The home keys on the numeric keypad are?
Eva8 [605]
4, 5 , 6 , and plus key
456+
5 0
3 years ago
Read 2 more answers
Please help in computer subject​
VMariaS [17]

Answer:

6. Read this quote from Ben Hogan below the photograph.

purple

"People have always been telling me what I can't do. I guess I have wanted to show them.

That's been one of my driving forces all my life."

31

What does this quote mean? Use at least two direct quotes from the text that give

examples of this quote.

A

urn

Julie Bahn

3 0
3 years ago
Read 2 more answers
Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
AleksAgata [21]

Answer:

Access Office Equipment is implementing a growth strategy.

Explanation:

Growth strategy can be defined as the strategy whose goal is to win market shares in a greater quantity. The earnings in growth strategy might be short-termed. The common growth strategies include:

  • product expansion
  • market expansion
  • market penetration
  • acquisition and diversification

I hope it will help you!

4 0
4 years ago
Other questions:
  • Please I need all the help I can get Thank You So Much
    14·1 answer
  • What allows user to double click with the mouse in a document to move the insertion point to a new location.?
    8·1 answer
  • What's is the contribution of technology to the country?
    15·1 answer
  • Which activity does not allow a person to perform any work while at the shop
    10·1 answer
  • In a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
    8·1 answer
  • Drivers are concerned with the mileage obtained by their automobiles. One driver has kept track of several tankfuls of gasoline
    10·1 answer
  • A class can inherit behavior from a parent but also define its own and override parent behavior. This is called:
    8·1 answer
  • Match the title of the work of fiction to the description given.
    8·1 answer
  • Help<br> pls need quickly
    9·1 answer
  • If you are inviting more than one person to a meeting, you can use a(n) _____ to separate the email addresses.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!