answersLogoWhite

0

Yes, the programs have been successfully copied into the system.

User Avatar

AnswerBot

4mo ago

What else can I help you with?

Continue Learning about Computer Science

What is a Opportunist threats on s computer?

An opportunist threat on a computer means that people who find an unattended computer that has been left logged in to a system could view, steal, or damage information, programs, or hardware.


List three third-party utility programs used to support hard drives?

Without knowing what Operating System you are using then websites like versiontracker.com have been able to provide a variety of programs that support hard drives


What is a pirated movie?

A counterfeit movie which has been obtained and then illegally reprodced and distributed, without obliging the correct rights.


What are the applications of the computer program Yacc?

YACC, which stands for Yet Another Compiler Compiler, is considered a parser generator. This family of computer programs is used to decipher source code in programming. This type of program is used with almost all computer programs, but YACC has mostly been replaced by more recent programs.


What are the Service provided by operating system?

Operating system (OS) provides two main services: file management and user interface with the hardware system. ^^ Following are the five services provided by an operating systems to the convenience of the users. The purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems. Running a program involves the allocating and deallocating memory, CPU scheduling in case of multiprocess. These functions cannot be given to the user-level programs. So user-level programs cannot help the user to run programs independently without the help from operating systems. === === === === Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs. For efficiently and protection users cannot control I/O so this service cannot be provided by user-level programs. === === === === The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished. Thus operating systems makes it easier for user programs to accomplished their task. This service involves secondary storage management. The speed of I/O that depends on secondary storage management is critical to the speed of many programs and hence I think it is best relegated to the operating systems to manage it than giving individual users the control of it. It is not difficult for the user-level programs to provide these services but for above mentioned reasons it is best if this service s left with operating system. === === === === There are instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on the different computers. By providing this service the operating system relieves the user of the worry of passing messages between processes. In case where the messages need to be passed to processes on the other computers through a network it can be done by the user programs. The user program may be customized to the specifics of the hardware through which the message transits and provides the service interface to the operating system. === === === === An error is one part of the system may cause malfunctioning of the complete system. To avoid such a situation the operating system constantly monitors the system for detecting the errors. This relieves the user of the worry of errors propagating to various part of the system and causing malfunctioning. This service cannot allowed to be handled by user programs because it involves monitoring and in cases altering area of memory or deallocation of memory for a faulty process. Or may be relinquishing the CPU of a process that goes into an infinite loop. These tasks are too critical to be handed over to the user programs. A user program if given these privileges can interfere with the correct (normal) operation of the operating systems.

Related Questions

How do you invent a toy?

To invent a toy you would have to come up with something that has never been made before or that hasn't been successfully made into a product. Then you have to have a patent for it and other legalities so that it is not copied by someone else.


What are copy right images?

images that have been copied correctly images that have been copied correctly


What is Operating System ReInstallation?

It is when your current Operating System and files are wiped from the main harddrive and a new copy of the operating system is installed. If backed up, you files can then be copied back into the new system, but programs will need to be installed again as well. This is usually done if hardware has (at least partially) failed, malware has damaged the system beyond repair, or for some other reason part of your system has been corrupted.


How can you get the date off of digital pictures that have already been taken?

If the picture has not been edited or copied since it was taken you can view the EXIF information, if you search online for exif viewer you can find many programs.


What is the use of clipboard in Excel?

The clipboard is a software facility that can be used for short-term data storage and/or data transfer between documents or applications, via copy and paste operations.


What are copied test questions to be deleted?

This question has been set up as a merge point for test questions that have been copied and pasted to WikiAnswers.


What has Microsoft invented?

nothing, it copied the computer from apple and IBM, it copied the xbox from Sony and nitendo, it copied windows from Apple, it copied zune from apple. Everything micro$oft ever made has been copied, not innovated, unlike apple.


Has hydro energy been used successfully in the past?

yes it has been used successfully .....because of what.......


Can you please confirm if the check has been processed successfully?

Yes, the check has been processed successfully.


What is the destination area or paste area in Excel?

It is called the Destination Area, and is where data is pasted after it has been copied or cut.


Who was so poplar that many women copied her hairstyle and fashions?

There have been many women who have been copied through the years. To give you an accurate answer we need a time or date.


Where can one get current information about internet marketing programs?

To receive current information about internet marketing programs, one can visit an online course. These courses will consist of a fixed term program and will likely have a certificate to certify one when the program has been successfully completed.