adplus-dvertising
frame-decoration

Question

The operating system does all of the following except-

a.

Provide a way for the user to interact with the computer.

b.

Manage the central processing unit (CPU).

c.

Manage memory and storage.

d.

Enable users to perform a specific task as document editing.

Posted under IT Fundamentals

Answer: (d).Enable users to perform a specific task as document editing.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The operating system does all of the following except-

Similar Questions

Discover Related MCQs

Q. All of the following are steps involved in the boot process except-

Q. The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.

Q. The basic input/output system (BIOS) is storage in-

Q. Ensuring that the essential peripheral devices are attached and operational is the ____ Process.

Q. Hyper-threading (HT) is related to-

Q. Intel and AMD are leaders in-

Q. IDE (ATE) or SATA interface connect Mother board with-

Q. USB is a type of-

Q. Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-

Q. Process of Combining strings is known as

Q. A program that performs a useful task while simultaneously allowing destructive acts is:

Q. In 1999, the Melissa virus was a widely publicized:

Q. An intentionally disruptive program that spreads from program to program or from disk to disk is known as

Q. The majority of computer crimes are committed by:

Q. A logic bomb that was created to erupt on Michelangelo's birthday is an example of a:

Q. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

Q. HTML viruses infect:

Q. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

Q. __________ is the measurement of things such as fingerprints and retinal scans used for security access.

Q. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):