Answer :
Answer:
.By hiding hard ware complexity.
.By managing the computational resources.
.It directly privilege access to the underlying hardware.
Answer:
.By hiding hard ware complexity.
.By managing the computational resources.
.It directly privilege access to the underlying hardware.