Which operating systems is used primarily for networks?

1 Answer

Answer :

Windows

Related questions

Description : Real_time operating systems (a) are primarily used on mainframe computers (b) can respond quickly to an event (c) are used for program development -Technology

Last Answer : (b) Real-time operating systems can respond more quickly or predictably to an event than any other OS.

Description : Social networks are organized primarily around __________. A. brands B. people C. discussions D. interests

Last Answer : B. people

Description : 10. Social networks are organized primarily around __________. *  brands  people  discussions  interests

Last Answer :  people

Description : Social networks are organized primarily around ___.  A. Discussions  B. Brands  C. People

Last Answer : C. People

Description : EDI requires a. representation of common business documents in computer readable forms b. data entry operators by receivers c. special value added networks d. special hardware at co-operating Business premises

Last Answer : a. representation of common business documents in computer readable forms 

Description : An iron cored inductance coil can be modelled, over a normal operating range of networks ,as A) non-Linear bilateral element B) linear bilateral element C) linear time varying element D) non-linear time invariant element

Last Answer : An iron cored inductance coil can be modelled, over a normal operating range of networks ,as linear bilateral element

Description : Do the wireless speakers associated with new home theater systems interfere with home wireless networks?

Last Answer : There are now 2-Band routers. Check and see if you can run the speakers at one frequency and your 802.11 on a second.

Description : Which of the following is not a common application of fiber-optic cable? a. Computer networks b. Long-distance telephone systems c. Closed circuit TV d. Consumer TV

Last Answer : d. Consumer TV

Description : Data switching systems. A. improve the efficiency of data transfer B. are limited to small data networks C. required additional lines D. are not used in data system

Last Answer : A. improve the efficiency of data transfer

Description : Which of the following is an extension of the semantic network? a) Expert Systems b) Rule Based Expert Systems c) Decision Tree Based networks d) Partitioned Networks

Last Answer : d) Partitioned Networks

Description : For purposes of routing, the Internet isdivided into ___________. A) wide area networks B) autonomous networks C) autonomous systems D) none of the above

Last Answer : autonomous systems

Description : MCI and AT&T are examples of whichof the following? A) Social networks B) Communications systems C) Internet service providers D) Mobisodes

Last Answer : Internet service providers

Description : ………………... are needed to communicate with systems on other networks. A. repeaters B. amplifiers C. Bridge D. Gateways

Last Answer : D. Gateways

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Computer systems are comprised of: a) Hardware, Software, Procedures, Networks and People b) Hardware, Programs, Processors, Procedures and People c) Hardware Programs, Information, People and Networks d) None of These

Last Answer : a) Hardware, Software, Procedures, Networks and People

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which among the following includes the areas of Artificial Intelligence specialization: a) Games (Programming computers to play games against human opponents) b) Natural Languages (Programming computers to understand natural ... that occur in animal brains) d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Computer systems are comprised of a) hardware, programs, processors, procedures and people b) hardware, programs, information, people and procedures c) hardware, programs, information, people and networks d) hardware, software, procedures, networks and people e) None of these

Last Answer : d) hardware, software, procedures, networks and people

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : What is Grade of service and blocking probability? What are delay systems in telecommunication networks?

Last Answer : Grade of service: In loss systems, the traffic carried by the network is generally lower than the actual traffic offered to the network by the subscribers. The overload traffic is rejected ... Switching Packet Switching Digit Receiver access Automatic Call distribution Call Processing  

Description : Which of the following is not a common application of fiber-optic cable? ∙ a. Computer networks ∙ b. Long-distance telephone systems ∙ c. Closed circuit TV ∙ d. Consumer TV

Last Answer : d. Consumer TV

Description : Which of the following leads to evolution of 3G networks in CDMA systems? a) IS-95 b) IS-95B c) CdmaOne d) Cdma2000

Last Answer : d) Cdma2000

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : ______________is a branch of science that deals with programing the systems in such a way that they automatically learn and improve with experience A. Machine Learning B. Deep Learning C. Neural Networks D. None of these

Last Answer : A. Machine Learning 

Description : 108.is primarily a management technique that uses energy information as a basis to eliminate waste, reduce and control current level of energy use and improve the existing operating procedures. a) Energy monitoring and targeting b) CUSUM c) Specific energy consumption d) Production

Last Answer : Energy monitoring and targeting

Description : What type of systems primarily use accelerometers?

Last Answer : Navigation systems.

Description : Why do modern operating systems lack a WPS wifi option?

Last Answer : A major security flaw was discovered in the system in 2011 and it kind of fell out of favour after that.

Description : Creepiness. Microsoft operating systems doesn't have a support center somewhere in India that calls you first, do they? Should I call trace him or just blow it off? Where did he get my number?

Last Answer : answer:It is a scam to get you to install shit. http://arstechnica.com/tech-policy/2012/10/i-am-calling-you-from-windows-a-tech-support-scammer-dials-ars-technica/

Description : What operating systems are there besides Windows?

Last Answer : Wikipedia’s timeline of operating systems might be helpful. There’s also the list.

Description : Why does Apple keep info on it's pre-released Operating Systems under NDA?

Last Answer : answer:Considering how sue-happy they are right now, I think that the NDA is redundant at best. I am almost surprised that any non-Apple OS is allowed to use icons. Seriously though, it is pretty much just a formality.

Description : How can I boot between 3 different operating systems?

Last Answer : You need to understand how boot.ini works: it’s a text file that specifies the items on the boot menu, it’s usually located on c:\ (or the root of whatever drive is marked “active” for booting). You can learn the details of boot.ini here: http://en.wikipedia.org/wiki/NTLDR

Description : Can you help me make sense of the different cell phone operating systems?

Last Answer : They all do many of the same things. Honestly, it comes down to what features you want on your phone and the learning curve you are willing to deal with. One of the advantages of the iPhone is that it is ... better. Anyway, it's by Google like you said, but I haven't had a chance to see/use it.

Description : Is Microsoft dropping the ball on operating systems?

Last Answer : Except for Steve Jobs, Bill gates is the second largest stock holder for Apple. IT is a numbers game. There is NOTHING Apple does without Gates ok. All biased on the PC sheep not really ... healthy competitive environment so Microsoft does not come off as a monopoly. THat is all it is about.

Description : Can 32 bit Operating Systems run on 64 bit hardware in a VM?

Last Answer : I don’t know about in virtualization, but 64 bit hardware can certainly run a 32 bit OS.

Description : the two most common computer operating systems in the world are _________. -General Knowledge

Last Answer : The two most common computer operating systems in the world are Windows and OS X.

Description : most smartphones use operating systems developed by ________. -General Knowledge

Last Answer : A) Google and Apple

Description : Differentiate between hard and soft real_time operating systems. -Technology

Last Answer : Difference between hard and soft real-time OS are as follows:Hard Real-Time OSSoft Real-Time OS1. A hard real-time system guarantees that critical tasks complete on time.1. A soft real-time ... .3. Usually, they are periodic tasks scheduled in background, during the idle time of the processor.

Description : Explain some of the characteristics of modern operating systems. -Technology

Last Answer : Some characteristics of modern operating system are as follows:1. Microkernel ArchitectureProvide a communication facility between the client program and the various services that are also running in ... kernel. Also, it enable programmers to customise an OS without disrupting system integrity.

Description : Why is Linux different from other operating systems ?

Last Answer : The main reason for the popularity of Linux is its value. You get Linux for free where you have to spend a lot of money to buy another good operating system. This financial aspect of the Linux ... trainees also get a chance to get a detailed idea about the structure of a complete operating system.

Description : Why do most operating systems let users make systems changes?

Last Answer : I dont

Description : Are webpages presented in exactly the same way across different operating systems web browsers?

Last Answer : Need answer

Description : How to Customize an Ubuntu Operating System’s Appearance?

Last Answer : Ubuntu Linux is one of the most customizable operating systems available today. If you have recently moved from a Windows system to Ubuntu, you may be surprised by the freedom that this system offers. The ... The main menu, which is equivalent to the Windows Start Menu, can use a custom image on th

Description : Advantages of Linux Operating Systems?

Last Answer : Chances are that you've heard of Windows and Mac, but anotheroperating system is gaining popularity among users worldwide. Linuxis not a new operating system. In fact, it has been around foralmost ... . This operating system is offered at no cost to the individualconsumer because it is licensed unde