Operating systems provide_________ —programs that execute system commands on behalf of the user.

a) processes.
b) threads.
c) shells.
d) None of the above.


c) shells.

Computer Science & Information Technology

You might also like to view...

You are passing a two dimensional array, defined as below, to a function. What would be a correct function prototype? (ROWS and COLS are global constants.)

int table [ROWS] [COLS]; a) float calculate (int matrix [ ] [ COLS], int rows); b) float calculate (int matrix [ROWS ] [ ], int rows); c) float calculate (matrix [ ROWS] [ COLS], int rows); d) float calculate (int matrix [ROWS ] [ ], int cols);

Computer Science & Information Technology

Cell references used in formulas can lead to unexpected results when you copy or move the formulas.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Files, such as graphics files, that are used in a Web page are known as ____________________ files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The basic security concepts critical to information on the internet are authentication, authorization, and non-repudiation; those related to the persons accessing information are confidentiality, integrity, and availability.

a. true b. false

Computer Science & Information Technology