6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​

Answers

Answer 1

Answer: windows is an operating system


Related Questions

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

Answers

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. The form of computing that the project will be using is grid computing.

In the field of computers, when multiple computing systems are used so that a single task can be achieved, then such a system is referred to as grid computing.

The main purpose of grip computing is to work on a joint task where each computer system is specialized in one way or the other in order to help in the joint or single goal. Hence, the correct option is grid computing.

Other options, such as mobile computing, are not correct as mobile computing is a wireless communication for the transmission of data.

Although a part of your question is missing, you might be referring to this question:

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

A. mobile computing

B. grid computing

C. cloud computing

D. green computing

To learn more about grid computing, click here:

https://brainly.com/question/14511163

#SPJ4

Key history of computers

Answers

Explanation:

The history of computers starts out about 2000 years ago in Babylonia (Mesopotamia), at the birth of the abacus, a wooden rack holding two horizontal wires with beads strung on them. Blaise Pascal is usually credited for building the first digital computer in 1642.

4) Which of the following computers is the fast and expensive computer? a) Mini Computer b) Super Computer c) Main frame d) desktop computer​

Answers

Answer: Supercomputers are the computers which are the fastest and they are also very expensive

Answer:

Super Computer

Explanation:

____ software can automate key functions of the purchasing process including creating, reviewing, and approving purchase orders and transmitting these purchase orders electronically to the supplier.

Answers

E-procurement software can automate the major functions of a purchasing process. Key functions offered by the e-procurement software include creating, reviewing, and approving purchase orders as well as transferring these purchase orders to the supplier electronically.

E-procurement software automates the workflow of the purchasing process, thus completely replacing the paper-based process of purchase orders. The key functions that an e-procurement software provides to the organizations to buy goods and services online through the supplier’s system are creating, reviewing, and approving purchase orders; and sending these purchase orders online to the supplier’s software system.

E-procurement software streamlines all parts of the purchase process to acquire goods and services a business needs to run. The e-procurement software enables the organization to obtain products and services within the best possible time at the best possible price.

You can learn more about e-procurement software at

https://brainly.com/question/13165862

#SPJ4

Keyboard shortcut for the following
Undo-
Find-
Cut-
Paste-
Save-
Open-​

Answers

Answer:

undo- ctrl+ z

find- ctrl + F and ctrl G

Cut- ctrl + x

Paste- Crtl + v

Save- Crtl S

Open - Crtl P + Crtl K

Explanation:

Answer:

and

Explanation:

Undo-(Ctrl + Z)

Find-(Ctrl + F)

Cut-(Ctrl + X)

Paste-(Ctrl + V)

Save-(Ctrl + S)

Open-(Ctrl + O)

The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?

Answers

The terminology used to describe a possible path to a resolution to a problem from one end to the other is called a solution.

What is terminology?

The research of these phrases and related applications is known as terminology science. A glossary is a collection of specialist words plus their corresponding interpretations in a given field.

If there is a body or a term which is the need to have a resolution that needs to be made through that the person can evaluate and find a solution for the following situation then that is called a resolution or solution for that particular problem

Learn more about terminology, here:

https://brainly.com/question/2511894

#SPJ1

A system whereby large quantities of data can be accessed, searched, sorted and arranged very rapidly by computer is called a(n) ________ system.

Answers

A system whereby a large amount of data can be accessed, arranged, sorted, and searched very rapidly by computers is called a database management system.

Database management system is a computer-based system that provides users facilities to perform several types of operations on data. For example, database management system aids users in handling large quantities and multiple types of data in that the data can be accessed, organized, sorted and searched very rapidly.

The ability of the database management system in which data can be accessed, organized, searched and sorted very rapidly helps users working in different organizations and industries.

You can learn more about database management systems at

https://brainly.com/question/24027204

#SPJ4

What are the output voltages that have been commonly produced by pc power supplies over the years?

Answers

Over time, the output voltages that pc power supply have typically produced are

+3.3VDC, +5VDC, -5VDC, +12VDC and -12VDC

A power supply is what?Every PC's foundation is made up of power supply components. These components transmit power throughout your PC by snatching it from the wall outlet. Your machine won't work as you need it to and might not even turn on if you don't supply it with enough electricity.For the internal components of a computer, a power supply unit transforms mains AC to low-voltage, regulated DC power. Switched-mode power supply are utilized by all contemporary personal computers. While some power supplies automatically adjust to the mains voltage, others offer a manual switch for choosing the input voltage. One essential component of every PC is the power supply (PSU).

To learn more about power supplies, refer to:

https://brainly.com/question/14510836

#SPJ4

quick and easy points how is this wrong Ap computer science?

Answers

The correct answer to the given question is Strings and not Variables.

This is because in JavaScript, the use of Strings is enclosed between a pair of either single quotation marks '' or double quotation marks "" and there is no difference between using double or single quotes, as they both serve the same function.

What is a String?

This refers to a linear sequence of characters, words, or other data and is a literal constant or variable

Hence, we can see that The correct answer to the given question is Strings and not Variables.

This is because in JavaScript, the use of Strings is enclosed between a pair of either single quotation marks '' or double quotation marks "" and there is no difference between using double or single quotes, as they both serve the same function.

Read more about strings in programming here:

https://brainly.com/question/15683939

#SPJ1

What statement indicates which variable to sort by when using a proc sort step? select one: a. out b. by c. proc sort d. data e. data = f. run g. out =

Answers

A statement which indicates which variable to sort by when using a PROC SORT step is:  b. by.

What is SAS?

SAS is an abbreviation for Statistical Analysis System and it can be defined as a statistical software suite which was developed at North Carolina State University by SAS Institute for the following field of study:

What is a PROC SORT?

In Statistical Analysis System, a PROC SORT can be defined as a function which is typically used to replace an original data set with a sorted data set, especially based on a variable.

Read more on Statistical Analysis and PROC SORT here: https://brainly.com/question/18650699

#SPJ1

In a typical hospital cdm layout, what do three asterisks (***) indicate regarding these services?

Answers

In a typical hospital CDM layout, the three asterisks (***) indicate that you do not have a CPT®/HCPCS Level II code built into the CDM.

Depending on the facility, some services, including surgeries, are dynamically coded (hand-entered) on a case-by-case basis and reviewed quarterly, semiannually, or yearly.

For the purpose of compliant and effective billing, reimbursement, and data gathering, hospitals may have a task force dedicated to the CDM or a single person in charge of keeping accurate data within the CDM. The duties of the CDM task force include:

At least once per year, Continually update as new practices or supplies are added to the hospital's service offering, Review and uphold payer data (bulletins, transmittals), and depending on that data, make CDM modifications.

Learn more about hospital CDM here:

https://brainly.com/question/13523148?referrer=searchResults

#SPJ4

The ipv4 network host can communicate with other local hosts but fails to reach the internet. what should the technician check?

Answers

There are several factors to consider when it comes to this issue.

HT Mode - Incorrect HT Mode settings could be the reason.

Faulty networking drivers - Switch to the most recent version of the networking device driver if the older one is broken or outdated.

Wrong DNS and IP addresses - They may have modified their DNS and IP address settings in the past to address another problem. This could be the root problem.

McAfee antivirus - it is said that this issue will persist, until McAfee is completely uninstalled from PCs.

Follow the link below to see the difference between IPv4 and IPv6

https://brainly.in/question/183077

#SPJ4

Is it possible to eavesdrop on the traffic passing over a company's internal network from the internet?

Answers

It is not possible because to eavesdrop the sniffer has to be attached to the same local network segment.

Internal Network refers to the Licensee's exclusive, private network resource that is only available by Authorized Users. The term "internal network" expressly excludes the Internet (as that term is generally used) and any other network community that is accessible to the general public, including associations, membership-based groups, and other similar organizations.

Use of the Software over an Internal Network should be considered to have taken place when Authorized Users connected over a secure link, such as a VPN or dial-up, to the Licensee's internal network.

Learn more about internal network https://brainly.com/question/15190548

#SPJ4

Which tab should you click if you want to add a caption for a picture or image in your Word document?

a. file
b. home
c. layout
d. references
e. mailings

Answers

Question:

Which tab should you click if you want to add a caption for a picture or image in your Word document?

Answer:

D. references

Explanation:

When you click references I am pretty sure that there would be an option that says "Insert captions".

I hope it helps you!
~XxBells is a cute girlxX~

#Learn with Brainly

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

Which system will be safer? Explain your answer.​

Answers

What do you mean by sythem like code or firewall

Hugh bought some magazines that cost $3.95 each and some books that cost $8.95 each. He spent a total of $47.65.
If Hugh bought 3 magazines, how many books did he buy?
The equation that models the problem is 3.95m + 8.95b = 47.65, where m is the number of magazines and b is the
number of books.
books

Answers

Answer:

35.80

Explanation:

If Hugh bought 3 magazines that would equal 11.85, and 47.65-11.85=35.80.

I hope this helps

Answer:

since m = 3, therefore 3.95m = 3.95×3 = 11.85

this implies that 11.85 +8.95b = 47.65

this means 8.95b = 47.65 - 11.85 = 35.80

therefore b = 35.80 ÷ 8.9 = 4

since b = 4 ,this means Hugh bought 4 books

This version of the web evolved to support more dynamic content creation and social interaction.

Answers

Websites that emphasize user-generated content, usability, participatory culture, and interoperability for end users are known as "Web 2.0" sites.

A Web 2.0 enables users to communicate and work together as co-creators of user-generated content in a virtual community through social media discussion. This contrasts with the original generation of Web 1.0-era websites when users were only able to passively consume material. Social networking and social media sites, blogs, wikis, folksonomies, video and image sharing websites, hosted services, web apps, platforms for collaborative consumption, and mashup applications are a few examples of Web 2.0 elements.

Learn more about web 2.0 https://brainly.com/question/12105870?

#SPJ4

Which type of evidence is not used by the auditor to obtain an understanding of the design and implementation of internal control?

Answers

The auditor does not use confirmation as a sort of evidence to understand how internal controls were designed and implemented.

All information used by the auditor to draw the findings on which the auditor's opinion is based, whether it came from audit processes or other sources, is referred to as audit evidence. Material that both validates and corroborates management's claims about the financial statements or internal control over financial reporting, as well as information that refutes such claims, make up audit evidence.

The auditor's goal is to organize and carry out the audit in order to gather adequate audit evidence to back up the conclusion made in the auditor's report.

Learn more about auditor https://brainly.com/question/28457117?

#SPJ4

Using the celsius_to_kelvin function as a guide, create a new function, changing the name to kelvin_to_celsius, and modifying the function accordingly. sample output with input: 283.15

Answers

Replace '''Your solution goes here''' with:

def kelvin_to_celsius(value_kelvin):

   value_celsius = 0.0

   value_celsius = value_kelvin - 273.15

   return value_celsius

This line defines the function

def kelvin_to_celsius(value_kelvin):

This line initializes value_celcius to 0.0

   value_celsius = 0.0

This line calculates the equivalent of value_kelvin

   value_celsius = value_kelvin - 273.15

This returns the equivalent value_celsius

   return value_celsius

When the Celsius temperature is unsatisfactory and a large quantity is needed, we do convert C to K. T (K) = T (°C) + 273.15 can be used to convert between the two temperatures using the Celsius to Kelvin formula.

Learn more about  celsius_to_kelvin:

https://brainly.com/question/12827244

#SPJ4

Most computer networks managed by a host mainframe computer use contention media access control.
true /false

Answers

   Computer networks managed by a central computer do not use media access control.

False

What is a computer network?

  A computer network is a composition of several electronic devices, whose purpose is to transmit data, information and resources, as well as to share them.

  They are communication systems, where one or more devices can be transmitters and receivers at the same time.

   However, computer networks that are managed by a central host computer do not use the access control to the containment media, since it is in charge of sending the main signals, and should not have the command network to the containment media.

False

Learn more about computer networks in:

https://brainly.com/question/18135120

#SPJ4

The purpose of testing a program with different combinations of data is to expose run-time and.

Answers

The goal of testing a schedule with different combinations of data is to tell run-time and errors.

Where is the data on the computer?A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming. Integral, Floating Point, Character, Character String, and Composite types are the five basic kinds of data types that are recognized by the majority of current computer languages. Each broad category also includes several particular subtypes. A datum is a single symbol of data, whereas data is any sequence of one or more symbols. Information is derived from data through interpretation. Data that is represented digitally instead of analogically uses the ones-and-zeros binary number system.

To learn more about computer data, refer to:

https://brainly.com/question/24540334

#SPJ4

Which one is not part of function definition line?
a. input arguments
b. code to perform the intented operation
c. name of the function
d. keyword 'function'
e. output argument

Answers

The answer to this question is option (d) keyword “function”. The keywordfunction” is not a part of the function definition line.

In the function definition line, the keyword “function” is not included. The function definition line consists of two parts one is the function definition header and the second is the function definition body.

The function definition line, also called function declaration statement, contains:

The name of the function Parameter list that receives input arguments and returns output arguments

Whereas, in the function definition body, the code to perform the intended operation is written.

For example,

int sum(num1, num2)            // this is function definition header

{                                                 /* this is function definition body between      

return num1+num2;           curly brackets “{}” */

}

The above function definition line (written in C++), consisting of function definition header and function definition body (enclosed in curly brackets), is explained below:

In function definition line:

“int” is the return type of function“sum” refers to name of the function num1 and num2 represent a parameter list that function receives as input and produces output for it

In the function definition body, the code is written to perform intented operations i.e. sum, where two numbers num1 and num2 are added.

In the whole function definition line, there is no keyword “function” written. Thus, it is the keyword “function” that is not a part of the function definition line.

While the all other options are the parts of function defination.

You can learn more about function defination at

https://brainly.com/question/14559440

#SPJ4

In the dual-process model of coping with bereavement, coping with loss and engaging in restoration can occur:_________
a. consecutively.
b. only several years after a death.
c. separately.
d. concurrently.

Answers

In the dual-process model of coping with bereavement, coping with loss and engaging in restoration can occur loss-oriented stressors and restoration-oriented stressors.

This model recognises two categories of stressors, loss- and restoration-oriented, as well as a dynamic, oscillating regulatory coping mechanism wherein the grieving person alternately faces and avoids the various grieving responsibilities.

The DPM framework was developed, used, and evaluated by other researchers globally after it was first conceived by Professors Margaret Stroebe and Henk Schut (both researchers educated in Western traditions) in 1999.

The idea of oscillation is essential to the Dual Process Model. Stroebe and Schut claim that active participation in a dynamic process of alternating between loss- and restoration-focused coping is a necessary component of effective grieving. A person who is grieving will alternate between facing their loss and avoiding it.

Learn more about dual process model:

https://brainly.com/question/14293804

#SPJ4

You are performing a network risk assessment to develop your disaster recovery plan. which of these are examples of preventative measures? check all that apply.

Answers

Examples of preventative actions on a network risk assessment include:

Using a warning system for power outagesSystem testing while monitoringTesting your knowledge and that of the users Preparedness for emergencies

A network risk assessment analyzes the networks that your business and its staff regularly use. The examination aids in identifying the threats to your sensitive data and crucial systems by using methodologies for risk assessment. Once you are aware of and aware of these risks, you may begin to organize your data according to the importance of the associated risk.

An excellent step you can take to assist the efforts of your expanding organization and help you achieve the objectives you've set is to do a network risk assessment.

Learn more about network risk assessment https://brainly.com/question/28398239

#SPJ4

In which situation would setting be the most important when posing a subject?
A) if the photograph is taken for a yearbook
B) if the photograph is taken for product placement
C) if the photograph is taken using props
D) if the photograph is taken for an actor’s headshot

Answers

The situation that setting would  be the most important when posing a subject is option C) if the photograph is taken using props.

What use do props serve in photography?

Props are said to be any items that are utilized to enhance and clarify the main subject of a photograph. When taking portrait photos, a prop will make the person stand out.

Additionally, it will let the person wants to who they are. The use of portrait props can be a tool that give creative photography concepts a fictional edge.

Therefore, The situation that setting would  be the most important when posing a subject is option C) if the photograph is taken using props.

Learn more about photograph from

https://brainly.com/question/13600227
#SPJ1

What is the first step in the data processing cycle? a. input b. storage c. processing d. output

Answers

Collecting data (output) is the first stage in data processing. Data processing occurs when data is gathered and summarized into usable data.

What exactly does data processing entail?When information is gathered and transformed into usable form, data processing takes place. Data processing must be done appropriately in order to avoid having a detrimental impact on the final product, or data output, and is typically carried out by a data scientist or team of data scientists.Data processing is the process of gathering and modifying data to create useful information. Information processing, which is the alteration of information in any way that can be observed by a third party, includes data processing. Data processing is the process of transforming information into a form that a computer can comprehend. Entering sales figures into an inventory control program is an example of data processing.

Hence the correct answer is option d) output

To learn more about data processing, refer to:

https://brainly.com/question/26642156

#SPJ4

Employees in XYZ Corporation all use the same word processing program. The program they are using is more than five years old. Over the years, a number of improvements have been made to the application. The company has decided to upgrade the software for its employees. Two IT employees will install the upgrade on each employee's computer. They estimate that it will take them an hour to install each upgrade. The company has one hundred employees, so they figure it will take approximately fifty hours to finish installing the upgrades — more than an entire workweek! In the space below, describe how a network would make this task easier.

Answers

For the situation given above, creating a network of computers will save a lot of working hours, and make the task of using the word processing programs much easier.

What is the significance of a computer network?

A computer network can be referred to or considered as the network of multiple interconnected computers in a system where they are used for the purpose of linking one main hub or server to a number of systems, thereby making the tasks controllable by a single system.

Therefore, the significance regarding computer networks has been aforementioned.

Learn more about computer networks here:

https://brainly.com/question/13992507

#SPJ1

When transitioning to a customer-management strategy, the ___________ department must finance new programs and technology that will help build learning relationships with customers.

Answers

The department must invest in new initiatives and equipment to support the development of collaborative connections with customers as it makes the switch to a customer-management strategy.

What is CRM?Customer relationship management, a technique used by businesses and other organizations to manage their connections with customers, frequently entails evaluating a large amount of data through data analysis. All communications and relationships between your company's customers are managed using a program called customer relationship management (CRM). The three distinct categories of CRM systems are operational, analytical, and collaborative. Businesses use a variety of techniques, plans, and tools together referred to as customer relationship management (CRM) in order to manage and examine client interactions and data throughout the customer lifecycle (CRM). In order to optimize client retention and boost sales, it is important to improve interactions with customers.

To learn more about CRM, refer to:

https://brainly.com/question/25656282

#SPJ4

A(n) ________ forecasts technology trends and evaluates and experiments with new technologies.

Answers

An emerging technology manager forecasts technology trends and evaluates and experiments with new technologies.

What is forecasts technology?

A forecast technology is a technology that is sued to forecast reports. This technology is used to estimate things before this is happening. They are used for weather forecasting, money values forecasting, and other things.

They used variables and patterns that are made before time, they focus on before things and check the patterns.

Thus, a manager of emerging technologies analyzes evaluates and tests new technologies.

To learn more about forecasts technology, refer to the link:

https://brainly.com/question/7600224

#SPJ1

Other Questions
Mr. Sanchezs class sold fruit pies for $1.89 each and Mr. Kellys class sold bottles of fruit juice for $1.56 each. Together, the classes sold 82 items and earned $140.13 for their school. Write and solve a system of equations that models this problem. Show all your work!Mr. Sanchez's class sold fruit pies, and Mr. Kelly's class sold bottles of fruit juice. ALS speech on Modern Education System in which organizational level is the eye in If quadrilateral WXYZ is reflected across the y -axis to become quadrilateral W' X' Y' Z' , what are the coordinates of X' ? (22 POINTS) WILL GIVE BRAINLEST, HELPPP!!!write 2 pargarphs about matter A rectangular block of copper metal weighs 1996 g. The dimensions of the block are 9.4 cm by6.5 cm by 5.6 cm. From this data, what is the density of copper? (hint: find the volume of a blockfirst) The maximum weight an apartment elevator can hold is 1510 pounds Bill weighs 190 pounds and he needs to carry boxes that weigh 40 pounds each Use the equation 40b 1901510 to find the greatest number of boxes Bill can carry in the elevator in one trip In what way did the meetings atMount Vernon in 1785, Annapolis in 1786, and Philadelphia in 1787 lead tothe writing of the U.S. constitution HELP WITH THIS MATH PROBLEM PLS PLS What holds ovum and what produces estrogen? HELPPPPPP! How many groups of 9/2 are in 1?!? Solve for x. -20=-X Who was featured on confederate money 150 years ago In the dual-process model of coping with bereavement, coping with loss and engaging in restoration can occur:_________ a. consecutively. b. only several years after a death. c. separately. d. concurrently. Which quadrilateral is trapezoid? i need help with this A 6.00 kg ornament is held at rest... 3(10-8)^2+4STEP BY STEP PLEASE IT NEED TO BE EVALUATE AND EXPLAIN Explain in words why the ultimate ruin probability does not depend on the arrival rate of claims under the classical risk model? PLS HElp I"LL MARK BRAINLIEST "Why is it important to never forget the events of September 11, 2001?"I already started "It is important to never forget the event of september 11, 2001 because, it's the day that marked and made history a horrible terriors attack, the day the two twin towers fell in New York, and we also shouldn't forget the many lives lost that day as well as the many brave firefighters who died. To begin, On September 11, 2001, a total of 19 jihadists and Islamic extremists hijacked airplanes and crashed into the World Trade Center, causing the collapse of the Twin Towers. people were crushed under the rubble, and some were in the building while it collapsed. "