what type of operating system is reponsible for running dozens of programs in support of a single user

Answers

Answer 1

Instead, a single-user multitasking operating system is utilized in this situation. Multiple applications and programmes can run simultaneously on a multitasking operating system.

What kind of operating system is in charge of managing a large number of applications for a single user?

For a computer or another device designed to execute numerous programs simultaneously, it is therefore less useful. Instead, a single-user multitasking operating system is utilized in this situation. Multiple applications and programmes can run simultaneously on a multitasking operating system.

Operating systems that support single-user single-tasking let a single user run just one program at a time. Specifically with wireless phones and two-way messaging in mind, this operating system was developed. Some operations are completed in a single frame, like printing a document and downloading pictures and movies.

Examples of operating systems that support multitasking include Microsoft Windows 2000, IBM's OS/390, and Linux (nearly all of today's operating systems do).

To learn  more about operating system refers to;

https://brainly.com/question/24760752

#SPJ4


Related Questions

Which of the two systems in figures do you think will need the largest motor to be able to turn

Answers

Among the two systems in figures, the one i do think will need the largest motor to be able to turn is figure 2.

What is the figure about?

Figure 2 is known to be the photograph that depicts a large detail of sheave wheels that is often used for pulling in a cable.

Note that The sheave wheels in the photograph are said to be used only  for a cable car, but they are said to be the same as that of the sheave wheels that is said to be used on a mine's winch system.

Hence, Among the two systems in figures, the one i do think will need the largest motor to be able to turn is figure 2.

Learn more about systems from

https://brainly.com/question/13603602

#SPJ1

Suppose an initially empty stack S has performed a total of 25 push oper- ations, 12 top operations, and 10 pop operations, 3 of which generated a StackEmpty exception that was caught and ignored. What is the current size of S

Answers

The total number of push operations performed on the stack is 25, and the total number of pop operations performed on the stack is 10. Therefore, the net effect of these operations on the size of the stack is:

Net effect = number of push operations - number of pop operations
Net effect = 25 - 10
Net effect = 15

The stack has also performed 12 top operations, which do not change the size of the stack. However, 3 of the pop operations generated a StackEmpty exception that was caught and ignored. These operations did not actually remove any elements from the stack, so we need to subtract them from the total number of pop operations to find the actual number of elements removed from the stack:

Actual number of pop operations = total number of pop operations - number of caught exceptions
Actual number of pop operations = 10 - 3
Actual number of pop operations = 7

Therefore, the net effect of all the operations on the size of the stack is:

Net effect = number of push operations - actual number of pop operations
Net effect = 25 - 7
Net effect = 18

Since the stack was initially empty, the current size of the stack is equal to the net effect of all the operations performed on it, which is 18. Therefore, the current size of S is 18.

Culinary Arts simply means the art of
(7 Letters)

Answers

Answer:

I believe it means C-o-o-k-i-n-g (7 letters)

Explanation:

Answer:

C-O-O-K-I-N-G

Explanation: I got this one correct pls mark as brainliest

Susan is excited to learn various safe ways to browse the Internet. She is looking for suggestions that would help her. Which are the valid suggestions for Susan? The Internet is a medium used by numerous individuals. As a user of it, the responsibility of privacy and security rests with the user. Susan should be aware of the potential risks associated with improper use of the Internet. She should hence share her Social Security number whenever asked for it. She should be careful when using third-party applications and download applications from trusted and secure sites only. Susan should also be careful while using social networking websites. Susan should update her location information whenever possible. She should not click on any unknown links and use secure browsing and strong passwords. An example of a strong password is susanishere.

Answers

Answer:

a

Explanation:

To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

Answers

Answer:

square brackets [ ]

Explanation:

Hope I could help. Good luck with your studies .

Why were most movies from the late 1890s until the early 1930s only filmed in black and white? The film used to make color motion pictures often overheated, which was a safety hazard, so it was generally not allowed. There were only a few people who could afford the technology to produce color motion pictures back then. Color films had to be hand-colored, frame by frame. Audiences did not want color motion pictures until later.

Answers

Answer:

Color films had to be hand-colored, frame by frame.

Explanation:

Colored films were a rarity during the late 18th and early 19th centuries. Most movies were produced in black and white as the production of colored films was a difficult task as the films have to be hand-colored, frame by frame.

However, things began to change with the development of art and technology. While the dye is used to tint the color of certain scenes before, the new development in the films allows the capture of all scenes in color. But this does not mean that all films are shot in color. Most films continued to be shot in black and white even after the development of colored films.  

Answer:

b

Explanation:

Which of the following lines, if any, contains a valid, though not necessarily accurate, comment? Explain why others are invalid. (In Java in case you were wondering)
a. int twoPi = 2*3.14159; / / *holds the value of 6 //* Valid? Why?
b. int twoPi = 3.14159; /* holds the value of two times pi */ Valid? Why?
c. int twoPi = 2*3.14159; /* holds the value of two times pi //* Valid? Why?
d. double twoPi = 2*3.14159; /* // holds the value of two time pi */ [comment] // Valid? Why?

Answers

Only the final sentence is true: double twoPi = 2*3.14159;

What is Java?

Due to the fact that twoPi is storing pi at 3.14159 after being multiplied by 2. Therefore, the comment is true.

The first sentence's remark is incorrect since the program will fail to compile unless the value is entered as int twoPi = (int)(2*3.14159);

the second statement is also incorrect because pi is never multiplied by 2, hence it is impossible to save pi times its original value.

The final sentence is similarly incorrect since using an int datatype variable to store that value of pi times two would result in a compile-time error.

To know more about Java visit:

brainly.com/question/29897053

#SPJ4

What is the graphic artist trying to achieve in this illustration, using contrast in color?

Answers

Answer:

Image result for What is the graphic artist trying to achieve in this illustration, using contrast in color?

Having a contrast of size adds visual interest in the composition, and will help you establish the key elements in your layout so you can be sure the viewer is focusing on the right area. Contrast of size is not applicable to just text; it can also be the images in the design.

Explanation:

Answer: the answer is emphasis

Explanation:

how does a programmer use digital waves to transfer sound?

Answers

An analogue sound wave is picked up by a microphone and sent to an Analogue to Digital (ADC) converter in the form of analogue electrical signals. The ADC converts the electrical signals into digital values which can be stored on a computer. Once in a digital format you can edit sounds with programs such as audacity.

An analogue sound wave is picked up by a microphone and sent to an analogue to digital converter which converts the electrical signals into digital values which can be stored on a computer.

What is analogue to digital (ADC)?

Analogue to Digital (ADC) is refer to as a system which converts an analog signal, such as a sound picked up by a microphone or light entering a digital camera, into a digital signal.

Once in a digital format that can edit sounds with programs such as audacity. To play digital audio convert the sound from digital values into analogue electrical signals using the DAC, these signals are then passed to a speaker that vibrating the speaker cone, moving the air to create sound waves and analogue noise.

For more information regarding analogue to digital, visit:

https://brainly.com/question/20827936

#SPJ2

You would ________ a table if you wanted to display only data that matches specific criteria.


a. freeze
b. sort
c. scale
d. filter

Answers

Answer:

D.) filter

Explanation:

I did this question

Please mark this answer brainliest!

You are installing a new hard drive and want to know if the operating system will be able to support it. What is the largest NTFS volume size supported, assuming a 64 KB cluster size as maximum

Answers

The largest NTFS volume size supported, assuming a 64 KB cluster size as maximum, is 256 TB. The correct option is D.

What is NTFS?

New Technology File System is a system of Windows Microsoft that used in storing or retrieving the data in a hard drive and solid state drive.

The options are attached:

A. 1 TB

B. 2 TB

C. 128 TB

D. 256 TB

Thus, the correct option is D. 256 TB.

Learn more about NTFS

https://brainly.com/question/14178838

#SPJ1

The next thing Maia wants to do is to indent the first line of her paragraphs.
How does she do this?

Answers

Answer:

She moves the first-line indent marker to the right.

Explanation:

Answer: d the first-line indent to the right

Explanation:

The next thing Maia wants to do is to indent the first line of her paragraphs.How does she do this?

Question #4
Multiple Choice
What type of address is used at the network access layer to uniquely identify a piece of network hardware?
O MAC address
O frame
IP address
O datagram
PLEASE HELP

Answers

The  type of address is used at the network access layer to uniquely identify a piece of network hardware is known to be called the MAC address.

Check more about the address below

What is a MAC address?

A MAC (is known to be called the Media Access Control) address, and it is one that is often seen  as a hardware or physical address. It is one that is said to be very special  12-character kind of alphanumeric attribute/ characteristic that is known to be used to tell about individual electronic devices on any kind of network.

Note that a good example of a MAC address is said to be: 00-B0-D0-63-C2-26. It is seen as the physical address and that is is also called a media access control, or MAC, address  and it helps to tell a device to another devices on similar  local network.

Therefore, based on the above, one can say that The  type of address is used at the network access layer to uniquely identify a piece of network hardware is known to be called the MAC address.

Learn more about network from

https://brainly.com/question/14672166
#SPJ1

MIPS provides a separate pair of 32-bit registers to contain the 64-bit product, called Hi and Lo. To produce a properly signed or unsigned product, MIPS has two instructions: a) multiply (mult) b) multiply unsigned (multu) To fetch the integer 32-bit products, the programmer uses the following instructions: a. move from Lo (mflo) b. move from Hi (mfhi) Both MIPS multiply instructions ignore overflow, so it is up to the software to check to see if the product is too big to fit in 32 bits. There is no overflow if Hi is 0 for multu or the replicated sign of Lo for mult. The instruction move from Hi (mfhi) can be used to transfer Hi to a general-purpose register to test for overflow.

Answers

In the MIPS architecture, a separate pair of 32-bit registers, Hi and Lo, are provided to store the 64-bit product of multiplication operations. MIPS offers two instructions for multiplication: "mult" for signed multiplication and "multu" for unsigned multiplication.

To access the 32-bit products, programmers use the following instructions: "mflo" to move the result from Lo to a register and "mfhi" to move the result from Hi to a register.

It's important to note that MIPS multiply instructions do not handle overflow automatically. It is the responsibility of the software to check if the product exceeds 32 bits.

To check for overflow, the programmer can use the "mfhi" instruction to transfer the value from Hi to a general-purpose register and then examine its contents. If Hi is zero for "multu" or contains the replicated sign of Lo for "mult," there is no overflow.

By using the "mfhi" instruction, programmers can test for overflow and take appropriate actions based on the result.

To learn more about MIPS : https://brainly.com/question/15396687

#SPJ11

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

The answers are A, C, E

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

Please help This is a homework in ICT class

Please help This is a homework in ICT class

Answers

as the director of procurement for your company's sales department, you are working with the it manager and cio to determine the technical requirements for purchasing new laptops for your sales representatives. the sales representatives often store a significant number of multimedia files (such as videos) on their laptops, which they use for customer education and demonstration purposes. they also want to boot their windows operating system quickly. what would be the best price-performance purchasing decision when it comes to providing storage media for the new laptops for the sales representatives (based on their requests)?

Answers

The ideal price-performance purchase when it comes to supplying storage media would be an SSD again for operating system as well as an HDD for preserving multimedia files.

A multimedia file is what?

Any computer that plays video and audio, audio just, or video solely is a multimedia file. Popular multimedia file types include. mp3 music files,. mp4, video, & avi video formats, as well as. wmv files.

Which 5 forms of multimedia are there?

Multimedia consists of five fundamental components: text, graphics, audio, videos, and animation. Text in a fax, for instance Pictures captured with a camera, maps created using a geographic information system, voice notes, music, graphical, dynamic graphics animation, comprehensive recorded and live video, and iridescent images.

To know more about multimedia files visit:

https://brainly.com/question/15586006

#SPJ4

which of the following actions occur at the beginning of an iteration of the data step? a. the automatic variables n and error are incremented by one. b. the values of variables created in programming statements are re-set to missing in the program data vector.

Answers

Answer:

Option (A)

Explanation:

The DATA step begins with a DATA statement. Each time the DATA statement executes, a new iteration of the DATA step begins, and the _N_ automatic variable is incremented by 1. SAS sets the newly created program variables to missing in the program data vector (PDV).

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

b. What is Algorithm? b . What is Algorithm ?​

Answers

\(\huge\purple{Hi!}\)

An algorithm is a procedure used for solving a problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

Algorithms are widely used throughout all areas of IT. In mathematics and computer science, an algorithm usually refers to a small procedure that solves a recurrent problem. Algorithms are also used as specifications for performing data processing and play a major role in automated systems.

An algorithm could be used for sorting sets of numbers or for more complicated tasks, like recommending user content on social media. Algorithms typically start with initial input and instructions that describe a specific computation. When the computation is executed, the process produces an output.

whats the answer :)?
i will give brainslist​

whats the answer :)?i will give brainslist

Answers

Answer:

Transmission medium is the answer

I will give brainliest help!
Architectural blueprints are protected under copyright but the actual buildings are not.

A.
True

B.
False

Answers

I would say true, but not 100% on that
Answer: True
(I’m 100% sure, I searched it up)
Please mark as brainiest

Question 2 of 25
What is the best definition of a programming language?
A. The internal language a computer uses to communicate with
other computers and devices
OB. A language that instructs a computer how to carry out functions
OC. A complex thought process that breaks down difficult problems to
find their solutions
OD. The language that developers use to communicate with one
another about software design
SUBMIT

Answers

Answer:

A language that instructs a computer how to carry out functions

Explanation:

The definition of computer programming is the process of writing code to facilitate specific actions in a computer, application or software program, and instructs them on how to perform.

This is a longer answer to the question just without "language" in it.

Answer:

B. A language that instructs a computer how to carry out functions

Explanation:

A computer language designed to provide standardized commands is known as a programming language. These instructions can be translated into a machine-readable code.

How is Ms word more suitable and easier for document designing?

Answers

Answer:

MS Word is a word processing application, that built with an excellent array of features that permit the editing of text documents, with fonts, margins, borders, and page layout properties. Tables, charts, word art, shapes and pictures can be easily added to enhance the appearance and professional look of documents, as well as being able to publish documents in Portable Document Format, PDF and other file formats

Using MS Word, users an create write contract documents, resume, write-ups, fliers, invitation cards, projects, and reports from several customizable templates available in the Online Templates option of creating New Documents

The application provides support and upgrade to users that enable them make the most use of their time by having the required text document creation features in one application

Explanation:

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

What does it mean to influence the government? Use influence in a sentence.

Answers

Answer:

Explanation:

Influence -- This refers to the outcome of an attempt to change someone's behavior or attitude. Power -- This refers to the means by which the influence is accomplished. Politics -- The pursuit of self-interest in an organization to protect or further either individual or organizational goals.

Answer: To influence the government is to do something that could possibly change the law, like writing a bill, sure it might not be passed but it can still be an influence the the government

Do you think we could use mathematical operators on string values rather than integers or floats? Explain.

Answers

Answer:

Yes and no. For example, you can do this:

print('hi' * 5)

Output:

hihihihihi

HOWEVER, you cannot do mathematical operations on strings. If I have a string "6" and try dividing it by 3, it's not going to work because... it's not an integer. While multiplying strings does work, you cannot actually do real math with strings unless you change them to int or float

Why should we not underestimate the widespread of mass media?
Select one:

a.
While we do not seem to be aware of it, media has always been a useful and influential part of our lives.

b.
Media's span of influence knows no bounds

c.
All of the given choices are correct

d.
The media could reach almost anywhere in the world

Answers

C. A false statement by a good media source can go a long way

We should not underestimate the widespread of mass media because C. All of the given choices are correct.

It should be noted that media has always been a useful and influential part of our lives and its span of influence knows no bounds.

Also, it's important for one not to underestimate mass media because media could reach almost anywhere in the world. Therefore, all the options are correct.

Read related link on:

https://brainly.com/question/23270499

Which of the following is NOT a common slide layout?
Comparison
Story
Two Content
Title

Answers

The answer is going to be story, for your question of the following that is not a common slide layout

explain how the internet works​

Answers

How does the Internet Work?

The Internet works through a packet routing network in accordance with the Internet Protocol (IP), the Transport Control Protocol (TCP) and other protocols.

Hope this helps you!

Explanation:

The internet is a worldwide computer network that transmits a variety of data and media across interconnected devices. It works by using a packet routing network that follows Internet Protocol (IP) and Transport Control Protocol (

Other Questions
How did the horse change life for the Plains people?First one will get brainly! what is the name of the process that creates intensive and extensive international connections, changing traditional relationships of time and space? b)perform a retrospective power analysis to compute the power to detect a difference between theirrigation methods from the analysis without blocks. provide a one sentence explanation of this value. c)explain why the power is so much lower for the analysis without blocks than the analysis with blocks. d)how many replicates per treatment would be needed to obtain the same power as the analysisincluding the blocks? explain memory hierarchy and detail 5/7-i is what answer -(x+2)+3(5+x)=41. please help me solve this equation Change 4% at a decimal Electrostatics is the branch of physics that deals with electric charges _____ and how they _____. Please choose the correct answer from the following choices, and then select the submit answer button. Answer choices in atoms; transfer in conductors; conduct in motion; transfer at rest; interact asap please thanks!6. find the eigenvalues of each matrix and determine a basis for each eigenspace. 30 0 93 10 -50-2 According to the Declaration of Independence the people have right to abolish a government if that government... Who was the famous Christian theologian who understood Philosophy as the schoolmaster that brought the Greek mind to Christ in the same way that the Law served as the schoolmaster to bring the Hebrew mind to Christ Find the area of the figure. Which two countries have the largest areas of highly productive aquifers? Kenny is putting a brick border around his irregular shaped garden. Before installing the border, Kenny mustcut the bricks to fit the angles of the garden. Use the given measures to answer the question.mzA=xmZB=(5x-5)m2C =(2x +20)mZD=(3x-15)mZE =(4x)What are the angle measures of each vertex of the garden? Show your work. Which of the following is a solution to the equation: tan(x+pi/4) = cotxa. -0.414b. -1.883c. -3pi/8d. 2.424 You play with me at night before going to sleep. You cant get caught fiddling with me at work or at school. You only let a select few people touch me. What Am I? In order for a voluntary exchange to take place,O the buyer has to feel that he or she will be better off after the transaction than before.O the seller has to feel that he or she will be better off after the transaction than before.O both parties must feel that the money or goods they receive is worth more to them than the money or goods they give up. Aume that good X i a normal good. If the price of good X increae, what will happen?5E/FAume that good X i a normal good. If the price of good X increae, what will happen?The ubtitution and income effect will both lead to le of good X being purchaed. The ubtitution effect will lead to le of good X being purchaed, while the income effect will lead to more of good X being purchaed. The ubtitution and income effect will both lead to more of good X being purchaed. There will be no income effect becaue only the price of good X ha changed Atypical pathogens associated with cardiac implantable electronic device infections. Pacing and Clinical Electrophysiology How do you do this 38,000 g = ? hg