1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
15

What makes an operating system the master controller

Computers and Technology
1 answer:
IceJOKER [234]3 years ago
5 0

Answer:

An operating system is a master control program, which controls the functions of the computer system as a whole and the running of application programs. All computers do not use the same operating systems.

Explanation:

You might be interested in
When you turn on a computer, Windows starts and displays a ____ consisting of the time and date.
nata0808 [166]

It really depends what device you're on.


For example, my wifes laptop shows a lock screen, then it shows a sign in screen.

My laptop shows ONLY the sign in screen.


My old laptop shows a sign in screen with the date and time. So I dunno man

7 0
3 years ago
Read 2 more answers
Where is the “Notes” option displayed in MS PowerPoint 2013? (I use a chromebook :P)
kow [346]

Answer:

menu bar

Explanation:

3 0
3 years ago
1. Which of the following is a new
Phantasy [73]

Answer:

CD or CD Rom

fhiykkoojnddeyui

8 0
3 years ago
a coach wants to divide the basketball team into 2 groups for practice game. Which statistical measurement is the coach most lik
sertanlavr [38]
Math or division
depends on what you learned :)

5 0
3 years ago
How is the cia triad used to evaluate encryption methods?
Lyrx [107]

Answer:

The CIA triad is an important concept in data security, which helps to prevent data from being seen by unauthorized parties, changed, and provide uninterrupted access to data when needed.

Explanation:

CIA triad stands for confidentiality, integrity, and availability. confidentiality is a concept in the triad that prevents unauthorized users from seeing the data, by access control and encrypting the data using various algorithms.

The Integrity of the data prevents the change of the data by unauthorized users. It uses an algorithm for drafting a calculative check to compare the actual data sent and the data received.

Availability tries to break the barrier of data shortage or data unreachable events, by providing multiple access or fault tolerance to data storage.

6 0
4 years ago
Other questions:
  • Kerning is the adjustment of space between ___ characters.
    11·1 answer
  • Which variable captures the fact that a person is spontaneous or flexible? A. senses B. judgment C. perceptiveness D. feeling E.
    15·2 answers
  • Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
    7·1 answer
  • Create a jQuery ready listener that updates the options within the element with ID toCurrency such that: The first element is: S
    12·1 answer
  • What is the grooming process as it relates to online predators?
    12·2 answers
  • Why would a store owner want to calculate a mean
    12·1 answer
  • Switched Ethernet, similar to shared Ethernet, must incorporate CSMA/CD to handle data collisions. True False
    6·1 answer
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • Which of these sentences correctly shows how youngsters use the Internet?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!