1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
2 years ago
11

In reference to operating systems, what is spooling? what does it stand for? chegg

Computers and Technology
1 answer:
blondinia [14]2 years ago
8 0

Answer:

Spooling is a process in which data is temporarily held to be used and executed by a device, program or the system. Data is sent to and stored in memory or other volatile storage until the program or computer requests it for execution. "Spool" is technically an acronym for simultaneous peripheral operations online.

You might be interested in
What type of wireless connection requires an unobstructed "line of sight" between transmitter and receiver?
lina2011 [118]

Answer:

Infrared

Explanation:

the connection which requires an unobstructed "line of sight" between transmitter and receiver is called Infrared connection.                                

Infrared is the device which is used in T. V remotes.            

Infrared is also used in computer in the device like cordless keyboard, mouses and infra touch screen.

5 0
3 years ago
________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after exec
valentinak56 [21]
The registers are used to temporarily hold small units of data and instructions .<span />
5 0
3 years ago
How do I change my username/display name
exis [7]

Answer:

.

Explanation:

you do to me on the bottom bar and once you hit that you click the pencil and change it

6 0
3 years ago
Read 2 more answers
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
The combination of two or more technologies or data feeds into a single, integrated tool is referred to as a _____.
igomit [66]
Mash-up, I believe, is the correct answer.
5 0
3 years ago
Other questions:
  • A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's p
    9·1 answer
  • You have no control over who view your post
    10·1 answer
  • Consolidating a system's physical and time resources is known as ________________.
    13·1 answer
  • python An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase an
    14·2 answers
  • 3. It is used to measure the resistance on ohms and voltage that flow in circuit both AC and DC current. A. Gadget C. Electrical
    12·1 answer
  • Question 10
    14·1 answer
  • Ok I'm sorry to all those who are trying to messasge me on brainly my brainly inbox is not working and hasn't work since the beg
    12·2 answers
  • What does this mean?​ pls help me
    12·1 answer
  • 25 Points Asap <br> Write a Java program named Light.java that displays a light bulb shown below:
    14·1 answer
  • 29. Write a program that asks to input any ten numbers and displays sum of them​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!