________ enables the application to request services from the operating system, such as a request to print or save a file
A) PnP B) RAM C) ROM D) API
D
Computer Science & Information Technology
You might also like to view...
Which choice is not a proper method of managing keys?
A. Memory locations of keys should be overwritten seven times. B. Keys may be sent to and reused by a different department. C. Keys frequently in use should be replaced frequently. D. Key expiration dates should be carefully monitored.
Computer Science & Information Technology
How have embedded computers and the IoT impacted your daily life? What additional uses can you see yourself using? What security or other risks might you encounter with IoT?
What will be an ideal response?
Computer Science & Information Technology