Operating systems provide_________ —programs that execute system commands on behalf of the user.
a) processes.
b) threads.
c) shells.
d) None of the above.
c) shells.
You might also like to view...
You are passing a two dimensional array, defined as below, to a function. What would be a correct function prototype? (ROWS and COLS are global constants.)
int table [ROWS] [COLS]; a) float calculate (int matrix [ ] [ COLS], int rows); b) float calculate (int matrix [ROWS ] [ ], int rows); c) float calculate (matrix [ ROWS] [ COLS], int rows); d) float calculate (int matrix [ROWS ] [ ], int cols);
Cell references used in formulas can lead to unexpected results when you copy or move the formulas.
Answer the following statement true (T) or false (F)
Files, such as graphics files, that are used in a Web page are known as ____________________ files.
Fill in the blank(s) with the appropriate word(s).
The basic security concepts critical to information on the internet are authentication, authorization, and non-repudiation; those related to the persons accessing information are confidentiality, integrity, and availability.
a. true b. false