Which part of the os provides users and applications with an interface to manipulate files?

Answers

Answer 1
I would think you're looking at the GUI, or, Graphical User Interface.

If it's manipulating files only, maybe your looking for the answer of the Filesystem.

I hope this doesn you some good.

Related Questions

Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

Answers

Answer:

Software as a Service (SaaS).

Explanation:

   SaaS has been a strong trend in the business world. It is an acronym for Software as a Service, which means in our language software as a service.

    That is, they are online applications that can be used on your computer, tablet or mobile phone simply and remotely.

    It is a program that is not installed and that is used as a service by connecting to the Internet.

    As a service, it means that the customer does not purchase a license for a product but the right to enjoy the service offered.

    Therefore, all work related to the software is in the vendor's hands.

    Making a product available in SaaS format is a way of distributing content or technology solution in a more accessible and secure way.

    Software as a service may also be known by other names, such as web-based, on-demand, or hosted software.

    Netflix is a notorious example of SaaS that has gained prominence worldwide.

You have a usb storage device that you cannot get working. you have enabled all appropriate usb options in the latest 2.2 kernel but still cannot get your device working. what is most likely the source of the problem?

Answers

the device might have a problem eg: a faulty usb port , or maybe you stick requires 3.0 usb ports

How do you calculate the total voltage in a series circuit with more than one component?

Answers

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source.

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source. You can find total resistance in a Parallel circuit with the following formula: 1/Rt = 1/R1 + 1/R2 + 1/R3 +...

the five steps in the fetch/execute cycle and how do they correspond to a restaurant

Answers

The five steps in the fetch/execute cycle are : 
1) Instruction Fetch (IF) - This starts with the moving from the memory to
     the control unit which is given by the program counter. The control unit
     can then access the data immediately from the memory.
2) Instruction Decode (ID) - what task the system has to do, where the
     results is to be stored and what operation is to be performed by which
     data.
3) Data Fetch (DF) - it gets the value from the memory.
4) Instruction Execute (IE) - The particular instruction is executed.
5) Result Return (RR) - The Result Value is restored in a
    particular memory location.  The return of new data resulting from
    (EX) that is put back into memory.

In the launch of the Space shuttle Discovery what does "auto sequence start" mean?

Answers

The countdown clock before a rocket launches is one of the most remarkable timepieces in the world. As indicated by the "T-minus" mark, the hours and minutes tick down to launch. “Auto sequence start” is a breakdown of some of the big milestones leading up to that final moment. If there are no technical issues, at T-minus 31 seconds, the ‘go’ command will be given “Auto sequence start” which means the Ground launch sequencer will hand off primary control. It will be handed off to the shuttle’s onboard computers.

You can upgrade a cpu by adding registers and cache memory to it.
a. True
b. False

Answers

False, to upgrade a CPU, you need to replace the CPU with a better CPU.

_____ describes the way the components in a network interact.​

Answers

Logical Topology describes the way that components in a network interact.  Logical topology is the arrangement of devices on a computer  network and how they communicate with one another.  It describes how signals act on the network.  his type of topology is not interested in how devices on the network are connected but how they communicate with each other. 

A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.

which of the following is not an advantage of using asynchronous data transmission

Answers

The following is not an advantage of using asynchronous data transmission :

a) Overhead of start and stop bits

b) False recognition of these bits due to noise on the channel

Answer:

Inexpensive software.

Answer these questions and label each answer with the correct number.

1. List the stages in the technology design process.
2. What are prototypes used to test?
3. Why do engineers redesign a product after testing a prototype?
4. To whom do engineers communicate the solution?

Thanks!

Answers

1) Goals, specifications, model, and then public opinion about the product
2) Prototypes are used to test whether the product works like it is is supposed to, and for the public to be convinced that they are not wasting money on a product that does not work
3) Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product
4) Engineers communicate with the company that hired them, or the government if applicable.

he technology design process, like scientific inquiry, does not always follow rigid steps. Often, engineers follow a common process: They identify a need, research the problem, design a solution, build and evaluate a prototype, troubleshoot and redesign, and communicate the solution.

A prototype is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from. ... A prototype is generally used to evaluate a new design to enhance precision by system analysts and users.

Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product

Engineers find solutions to the problems faced by the society . Once the solution has been devised the engineers communicate it to the laborers and the workers so the implement it on field or on the work stations.

The expanded needham-schroeder protocol can be shortened to a 6-message protocol without loss of security by merely removing the 7thmessage. why is this true? (hint: the purpose of the 7thmessage is to prove to bob that he is talking to alice, but he already knows that. why?)

Answers

This is true since the ticket issued by KDC is enciphered by Alice's key, KAlice, so the one who can decrypt the fourth message and get the ticket to Bob is Alice only, which means that the one who is sending the ticket to Bob is Alice and nobody else.. (No one can get the ticket from the fourth message.)

While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using

Answers

The answer is DMNNAMSVR.  While in an interactive nslookup session, one would use the DMNNAMSVR keyword to change the DNS server one is using.

When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each interface a link-local unicast address. what is the order of steps involved in this autoconfiguration process?

Answers

1) The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2)  Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
3) Knowing the link-local address is unique, it configures the interface to use
    that address
4) The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it 

Questions on blender
2. Which of the following is a special mode for making changes to a object? (1 point)

edit mode

mesh mode

landscape mode

drawing mode



3. Which of the following do extrusion tools duplicate while keeping the geometry connected with the original vertices? (1 point)

vertices

edges

faces

circles

Answers

I believe the answer for 2 is Edit mode and the answer for 3 is edges. But im not 100%. I hope this helps if not i hope you find the correct answer. 

When a switch is closed, completing an lr series circuit, the time needed for the current to reach one half its maximum value is _____ time constants?

Answers

The answer is 0.693 .  When a switch is closed, completing an LR series circuit, the time needed for the current to reach one half its maximum value is 0.693   

e^(-t/T) = 0.5 
-t/T = ln(0.5) = -0.693 

how long does the Splunk search job remain active

Answers

When you run a new search job, the job is retained in the system for a period of time, called the job lifetime. f the job is not accessed within the specified lifetime, the job expires and is removed from the system. There are two lifetime settings, 10 minutes and 7 days. The lifetime starts from the moment the job is run.

An encrypted vpn link guarantees that the other end of the vpn connection is secure.
a. True
b. False

Answers

A-True
I hope this helps! :)

Answer:

The correct answer is letter "B": False.

Explanation:

Encrypted Virtual Private Networks (VPN) encode information so that only one computer with the correct decoder can read it so use it. The fact that one VPN is encoded does not imply that the VPN from where other user attempts to use it is encoded and secure. At least the encrypted VPN is safe but the other end is not unless encoded.

If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?

Answers

I would like to photograph a rose, because I have always been interested to know more about some flowers and what’s in the inside of them. Even though roses look pretty “simple” but beautiful in the outside, I suspect that there are a thousand of different things inside of it.

Answer and explanation:

Mainly, 3D microscopes are used in scientific research to observe the biologic composition of cells and microorganisms. If given the chance to use it to take some photographs, one good option could be to observe the cells of a zebrafish. Zebrafish have more than ten thousand (10,000) of cells that have the look of the sun's prominences. Comparing both of them could amaze us overall because of the difference in real sizes between but the similarity in shape.

Including AND in an IF statement means more than one condition can be included in the statement. exactly one condition can be included in the statement. the result may be both true and false at the same time. a new spreadsheet is generated using only data that meets the conditions in the statement

Answers

A. Just took the test.

Answer:

more than one condition can be included in the statement.

Explanation:

For example, if your mom tells you:

"You can only go out tonight if you do your homework and clean up your room"

The word and in the if condition is used to add another condition to the existant one, so the use of the word and in If statements is used to add more than one condition to the statement.

Brittany is looking to advance in her current career. She is creating a plan to help strengthen and increase her skills. What question should she ask herself? What areas do I need to improve? What should I wear when I interview? When should I apply for a new job? Who do I know that can give me a better job?

Answers

Answer:

The correct answer is What area's do I need to improve.

Explanation:

This will help her alot

Answer:

A) What areas do I need to improve?

Explanation:

To strengthen her skills she needs to improve and be better.

If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, what will be the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent?

Answers

The answer is : CLIENT will have 7 records  AGENT will have 4 records.  If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent is CLIENT will have 7 records  AGENT will have 4 records.       

References placed at the bottom of a page are known as _____.

Answers

sources, I don't think this is a computer question.
The references placed at the bottom of a page are known as citations. They are usually used to show were you have got evidence.

Two major B2B models are ________. Select one: a. Auctions and social commerce b. Catalogs and vertical markets c. Sell-side marketplaces and e-sourcing d. Outsourcing and horizontal markets

Answers

the answer could be a i might be wrong
Answer:

The major two B2B models are c. e-sourcing and sell-side marketplaces.

Explanation:

B2B is a business to business model which means the exchange of goods or services which happens between corporations or organizations but not with customers. It is providing services or goods online to other company. Example, a cyber-security firm providing online service to an e-commerce company as part of risk mitigation plan to avoid credit card fraud.

The advantage of such model is sustainable and high-profit margin from repeated clients.

One disadvantage is this model will be having a smaller number of customers.

What is the physical address of the logical address 8205?

Answers

 I don't understand your question, like what do you mean?

should i get a razer phone or gpd win pls help!!?

Answers

I’m not sure what question you are asking

Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and characters until a match occurs is known as ________.

Answers

The answer is Brute forcing.

What type of device is characteristic of an enterprise environment?

Answers

A workstation used at an engineering firm.

____ data updates in your destination document if there are changes to the source data
A) integrated
B) embedded
C) linked
D) field

Answers

I think its D (Field) I'm not sure but seems better than others.

Which three states can be applied to switches using vlan trunking protocol (vtp)? select one:
a. transparent, server, and client
b. secure, transparent, and gateway
c. master, server, and client
d. open, closed, and active?

Answers

The answer is (A) transparent, server, and client

A switch can be configured in any of the above VTP modes.

Transparent: VTP transparent switches forward VTP ads that they receive out their trunk ports in VTP version 2. However, VTP transparent switches don’t participate in VTP.

Server: In this mode, you can create, modify and delete VLANs. You can also specify other parameters like VTP pruning and VTP version for the entire VTP domain.

Client: This mode behaves the same as server, but you cannot create, modify and delete VLANs on a VTP client.






14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier? (1 point)

virtual reality

email marketing

video conferencing

social media



15. One of the elements that make the internet such a significant development is its ability to do which of the following? (1 point)

connect people all around the world

stream movies

offer ecommerce

share photos

Answers

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier?
The correct answer is: social media

15. One of the elements that make the internet such a significant development is its ability to do which of the following? 
The correct answer is: connect people all around the world

12. Which of the following is CourseBit®? (1 point)

an online class focused on drawing for architectural purposes

a leading Moodle™ development and hosting provider that focuses on highly customized systems

an icon in Blender® that allows you to easily switch between screens

a widget with which all animators should be familiar



13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around? (1 point)

non-blocking

non-overlapping

non-modal

non-confrontational

Answers

12. Which of the following is CourseBit®? 
a leading Moodle™ development and hosting provider that focuses on highly customized systems

13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around?
non-overlapping

Hope this helps.
Other Questions
How did Chiang Kai-sheks fear of communism cause him to alienate many Chinese intellectuals and political moderates? Olgas family traveled 942 kilometers on the first day of their trip and 894.5 kilometers on the second day.How many more meters did Olgas family travel on the first day?I'm in K12 and if you are too and have the answer, plz help Seventy percent of the bicycles sold by a certain store are mountain bikes. among 100 randomly selected bike purchases, find the probabilities below. (round your answers to four decimal places.) (a) what is the approximate probability that at most 75 are mountain bikes? Find the range of the following data. 5.3, 6.2, 3.1, 4.8, 7.3 Hey can you please help me out posted picture of question We pigged out last night. How do I make this a formal sentence? please help with math? will give branliest!!2.A wildlife refuge in South America has howler monkeys and spider monkeys. A biologist working there randomly selected eight adults of each type of monkey, weighed them, and recorded their weights in pounds.howler monkey: {15, 16, 17, 17, 17, 17, 18, 19}spider monkey: {12, 13, 13, 14, 14, 14, 16, 16}(a)Calculate the median each type of monkey.(b)Calculate the mean for each type of monkey.(c)Calculate the MAD for each type of monkey.(d)Calculate the means-to-MAD ratio for the two types of monkeys. (e)What inference can be made about the weight of both types of monkeys? Explain.Answer: Which statement is true of an oral tradition? A.It focuses on deepening cultural fears. B.Its stories involve powerful gods, cruel monsters, and ordinary heroes. C.It is passed down from generation to generation. D.Its stories can be found painted on cave walls. -3x-4=-13 solve inequality plz show work! One of the active chemicals in the fly agaric mushroom is _____ How much of a circle does a 100-degree angle turn through? A. 1B. 100/180C. 50/360D. 100/360 4 students ran for class president. In the elction, Mario got 40% of the votes. Jazmyne got 35% of the votes, Arturo got 10%,and Rachel got 60 votes. How many students voted? Which word signals a descriptive example?A.IsB.HasC.ShowD.Including According to identity theory, the process of maintaining identity in late adulthood involves balancing: Belinda's GPS system worth $400 was stolen out of her car. If Belinda's insurance policy summary is given below, how much will Belinda receive from her insurance company when she files her claim? SummaryComprehensive Deductible: $375Collision Deductible: $550Premium of $625 for 4 months What is the following product? Assume x>0 (4x5x^2 +2x^26)^2 A.80x^4+8x^430x+24x^4 B.80x^6+8x^5+8x^530x+24x^4 C.104x^4 D.104x^4+16x^430 which of the following increases heartbeat and respiration during periods of high emotion?A) the thyroid glands B) the adrenal glandsC) the pituitary gland D) the pineal gland Which was a result of improvements in transportation, such as canals and roads, in the early 1800s? A.increased trade B.rising prices C.reduced immigration D.economic depression what are two dynastic regulations that European had to follow if they wanted to interact with the Chinese government Use your notes to write a paragraph comparing and contrasting the effects of world war 2 on civilians in the soviet union, the united states, germany, and japan.