What types of customizations have you or would you make to your operating system, and why?

Answers

Answer 1

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.


Related Questions

what is the example of HTML?​

Answers

Answer:

For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data table

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?

Answers

Select row for "ExpirationDate", click the mouse and drag the field until the blue line appears above "Scent," and release the mouse button.

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

cises t Answer Questions 1. What is Open source Operating System? Write the advantages and disadvantages of Open source Operating System.​

Answers

Answer:

Question 1. Open source operating system is an operating system that allow the public to view and edit the source codes on which the operating system is developed, and any user can have access to and edit the source code

Advantages of Open Source Operating System

a) Open-source operating system are usually free, or very low price

b) The open source operating system are constantly being evaluated globally by skilled users and developers that can get bugs fixed once they are detected

c) Open-source operating system can be customized

Disadvantages of Open Source Operating System

a) The free access to the source code increases the vulnerability of open-source operating system to attacks

b) Users are expected to have a certain level of technical proficiency to be able to use an open-source operating system

c) The open-source operating system comes without a customer support service

Explanation:

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

Design a sequential circuit with two flip-flops A and B and one input X. When X = 0, the state of the circuit remains the same. When X = 1, the circuit goes through the state transitions from 00 to 10 to 01 to 11, back to 00, and then repeats. Show the state transition by 7-segment display decoder using a. D-Flip Flop-Section B b. T-Flip Flop-Section A c. JK-Flip Flop-Section B d. RS-Flip Flop-Section A

Answers

Answer:

see your answer in picture with detail

please mark me brainlist

Explanation:

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

A user informs you that he or she never deletes any files he or she creates. How might this affect the operating system? It will cause the operating system to crash. It will cause the operating system to upgrade. It will cause the operating system to run faster. It will cause the operating system to run slower.

Answers

Answer:

Depending on the amount of files there are, the operating system will run slower because these files take up space on the hard drive, slowing it down.

Explanation:

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

what is the georgia connections academy administrative password? i want to install something.

Answers

Answer:

ICL has world-class customized accredited curriculum of over 75 subjects & 1 on 1 support. ICL students compete at the highest level, perform on Broadway & excel in entrepreneurship. Customize Curriculum. Cambridge Style Seminars.


Emilio wants to add a name field for his clints. From the ribbon, which icon should be selected?

Answers

your answer is (more fields) then press enter

what allows an individual or company to share a post with an audience however they are designed to be used with mobile devices and limit the size of posts

Answers

Answer:

E-mail

Explanation:

The sending of messages via the Internet is known as e-mail. It is one of the most often utilised functionalities for sending text, files, pictures, and other attachments across a communications network.

A podcast lets a person or corporation to share articles with an audience, but it is geared for usage on mobile devices and has a capacity restriction.

How do you connect asp.Net mvc web application in visual studio 2013 to a database created in mysql query browser

Answers

Solution :

Asp.Net is a programming language of Microsoft. It stands for  Active Server Pages. It was developed by the giant, Microsoft which provides and helps the programmers to build a dynamic web sites, services and applications.

Using the asp.Net we can create a web application which provides interface to the existing database.

Creating an ASP.NET web application :

-- We create a new project in the Visual Studio in the same solution or the new solution and then select asp.NET web app template.

-- Name this project as ContosoSite.

-- Click OK.

-- Now in the project window of a new asp.Net project window, we select the MVC template.

-- Clear the Host in Cloud option as of now as we can deploy the application to the cloud later on.

-- Click ok for creating the application.

To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses

Answers

Answer:

using a pointer to member function to call function

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

Write the contribution of Charles Babbage in the history of computer.​

Answers

Answer:

The main contributions of Charles Babbage are;

1 ) He invented difference engine and analytical engine.

2) He gave basic concept of of mathematics in his analytical engine.

3) He also keep the concept of using binary digits in his machine.

4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output

Hope it helps.... :)

Which of the following statements is true about scalability? Choose 3 options.

Horizontal scaling has fewer limits than vertical scaling.

Scalability refers to the ability of hardware components to increase their capacity.

Scalability should be considered very early in the project.

The cloud offers services to automatically scale your system and balance the workload between components.

An example of vertical scaling is adding a new server to the network.

Answers

Answer:

Horizontal scaling has fewer limits than vertical scaling.

The cloud offers services to automatically scale your system and balance the workload between components.

Scalability should be considered very early in the project.

Explanation:

Hope this helps :) If not, please let me know what answers are wrong

The statements that is true about scalability are:

The clouds provide resources to scale the system and balance the workload between components

Scalability should be considered at the beginning of the project.

Horizontal scaling has fewer limits than vertical scaling.

Horizontal scaling is a type of scaling by adding more machines to your po of resources.

It is also called adding more power.

The difference between scaling up and scaling out is that horizontal scaling simply adds more machine resources to your existing machine infrastructure.

Vertical scaling is simply known to adds power to your existing machine infrastructure by increasing power from CPU or RAM to existing machines.

Conclusively, Scalability part of a system that handle a growing amount of work by adding resources to the system.

Learn more from

https://brainly.com/question/17661222

What type of operating system is Linux? An outsourced operating system An open source operating system A closed source operating system A variable source operating system

Answers

Answer:

Linux is a free, open source operating system.

Explanation:

Answer:

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage.

Considering what you know about dominant and recessive genes, what are the possible genotypes for brown eyed babies? What are the possible genotypes for blue eyed babies? Explain how you came to this response making sure to discuss dominant and recessive genes.

Answers

Answer:

B = Brown, b = blue

BB & BB = 100% Brown, 0% Blue

BB & Bb = 100% Brown, 0% Blue

Bb & Bb = 75% Brown, 25% Blue

Bb & bb = 50% Brown, 50% Blue

bb & bb = 0% Brown, 100% Blue

Explanation:

Reference the Punnett square. The brown gene when mixed with a blue gene  in one of the four squares is always dominant.

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

Answers

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

What is the role of memory in a computer​

Answers

Answer:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario

Answers

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

Hey, um guys help me as my laptop will not turn off properly as whenever i turn it off, it will turn back on by me pressing a key please help!!! URGENT!!!

Answers

Answer:

hold the power key until you restart.

Explanation:

a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A software that converts the program written in any programming language into machine language.. A software that is designed to perform specific tasks for the user c. d. A software package used for creating text document e. A software package used for editing images​

Answers

Explanation:

i don't know

If you were creating your own website, what would you include to make sure your website was reliable and
valid?

Answers

Answer:

I would make sure to include all the sources i used? IT depends on what the website is about.

Explanation:

Hey there!

These are the best things to do to your website if you want to make sure it's reliable and valid:

Include research Do NOT include any biased opinions

Hope this helps!

Have a great day! :)

Which kind of image is indispensable and needs added text to go with it?

Answers

Answer:

A chart and a graph

Explanation:

[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM

Other Questions
Carpet Renewal dyes carpets for residential customers. The company is interested in estimating fixed and variable costs. The following data are available for the month of June when 420 carpets were dyed: Office rent $ 1,250Depreciation - equipment 900Cleaning supplies 5,140Hourly wages 11,000Transportation (variable) 3,600Owners salary 3,100Total $24,990Using account analysis, how much is estimated variable cost per carpet?a. $59.50b. $52.12c. $47.00d. $38.43 within the story the author alludes to the king solomen and queen of sheba. the queen of sheba was known to be beautiful intelligent and bery rich. king solomen was said to exceed all kings in riches and, when he succeeded she showered him in giftss. how does these allusions add to the delopment of the story write a paragraph describing the car of the future A soccer player stands at one corner of a field and kicks a soccer ball 95 yards to the opposite corner. If the field is 76 yards long, what is the width? Why did Bob described his Friend Jimmy to be staunchest, truest and chap in the world? Amanufacturer of potato chips would like to know whether its bag filling machine works correctly at the 433 gram setting. It is believed that the machine is underfilling the bags. A 26 bag sample had a mean of 427 grams with a variance of 324. A level of significance of 0.05 will be used. Assume the population distribution is approximately normal. Is there sufficient evidence to support the claim that the bags are underfilled? Find the volume of a spherewith a radius of 6. Use 3.14 for n and roundthe answer to the nearest whole number Accrued Product Warranty Fosters Manufacturing Co. warrants its products for one year. The estimated product warranty is 4% of sales. Assume that sales were $379,000 for January. On February 7, a customer received warranty repairs requiring $250 of parts and $105 of labor. a. Journalize the adjusting entry required at January 31, the end of the first month of the current fiscal year, to record the accrued product warranty.b. Journalize the entry to record the warranty work provided in February. Select the correct answer from the drop-down menu.AThe diagram shows a stage in the construction of a line perpendicular to GH through point A.The next step in this construction isResetNext2021 Edmentum. All rights reserved. III. Put the adjectives or adverbs into the comparisons form. (Vit dng so snh ca t in m)1. This is a nice cat. It's much than my friend's cat.2. This is a difficult exercise. But the exercise with an asterisk (*) is the . exercise on the worksheet.3. In the last holidays I read a good book, but father gave me an even one last weekend.4. Yesterday John told me a funny joke. This joke was the joke I've ever heard.5. He has an interesting hobby, but my sister has the hobby in the world.6. Planes can fly (high) than birds.7. He had an accident last year. Now, he drives (careful) than before.8. Jim can run (fast) than John.9. Our team played (bad) of all.10. He worked (hard) than ever before. Write a conversation between the two friends talking about a friend getting married. Read this claim from paragraph 2 of the passage:Ten years later, mobile phones were available to the public, and since then cell phone technology has completely changedcommunication.Which type of evidence does the author use to support this claim?Select one:O a. Facts and statisticsO b. Expert opinionO c.Anecdotal evidenceO d. No evidence Chemical processes that involve one or more chemical reactions keep living things alive. Which of these types of chemical reactions joins small organic molecules into organic macromolecules? O A. Combustion O B. Hydrolysis O C. Oxidation O D. Dehydration Management of software development consist of?Chn mt:a. Processb. Peoplec. Projectd. All of the above Maria, Kevin, and Dan have a total of 96$ in their wallets. Dan has 6$ less than Maria. Kevin has 3 times what Dan has. How much do they have in their wallets? _ _ _ i had a headache, I enjoyed the movie.(although/despite/however) How does energy acquisition in the deep sea differ from energy acquisition near the oceans surface?a.Organisms in the deep sea acquire energy directly from the sun.b.Organisms near the oceans surface rely on chemosynthesis rather than photosynthesis.c.Organisms in the deep sea do not have direct access to sunlight.d.Organisms in the deep sea have no means to obtain energy unless they travel to the oceans surface. You own a portfolio that is invested 15 percent in Stock X, 35 percent in Stock Y, and 50 percent in Stock Z. The expected returns on these three stocks are 9 percent, 15 percent, and 12 percent, respectively. What is the expected return on the portfolio Farrah hasn't been feeling well for several days . She knows her boss isn't super understanding when it comes to calling in sick , and it's a really busy time at work , but she's in rough shape . What should she do? a) Go to work but wear a mask to cover her mouth b) Stay home for at least a day to keep from spreading germs c) Go in but try to avoid coming into contact with others d) Plan to go in but come home after lunch if she doesn't feel better 4.Read the sentence and answer the question.My mother and father practice the viola with the Cleveland Orchestra on Saturday and I stay home to practice the violin.Which correctly shows where a comma is needed in the sentence?A. My mother, and father practice the viola with the Cleveland Orchestra on Saturday and I stay home to practice the violin.B. My mother and father practice the viola with the Cleveland Orchestra on Saturday, and I stay home to practice the violin.C. My mother and father practice the viola with the Cleveland Orchestra on Saturday and I stay home, to practice the violin.D. My mother and father practice the viola, with the Cleveland Orchestra on Saturday and I stay home to practice the violin.