1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
14

What does MS-DOS use for input?

Computers and Technology
2 answers:
Elena L [17]3 years ago
5 0
Command line interface but it's giving u the command line base
Alborosie3 years ago
4 0

The answer is Command Line Base,

Hope this helps

<> Anna <>

You might be interested in
If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attem
Arada [10]

Explanation:

Both station will retract their data. They will wait a random amount of time before sending out data again. This lessens the chance of collision again.

8 0
2 years ago
What are the two basic steps in communication
Andrei [34K]

The sender forms an idea.The sender encodes the idea in a message.

4 0
4 years ago
Explain approaches of AI​
Umnica [9.8K]
A-artificial I-intelligent
5 0
2 years ago
Read 2 more answers
Which can be used to create a poll on a web page? <br>CSS<br>HTML <br>JavaScript <br>Text editor​
NeX [460]

Answer:

HTML can be used to create a poll on a web page.

4 0
3 years ago
The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
Kamila [148]

Answer:

Strength

Explanation:

A huge number of systems use a process called Pseudo Random Number Generation (PRNG). In NIST SP 800-90, The PRNG has a set of parameters that define various variables within the algorithm. The PRNG variable strength is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.

3 0
4 years ago
Other questions:
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • "what is the #1 resource used when researching a product online?"
    5·1 answer
  • Sofia is reading a difficult text for class and worries that she won't complete it by the given deadline. How can a text-
    13·2 answers
  • In the structure of a conventional processor, what is the purpose of the data path?
    15·1 answer
  • Find the word-length 2's complement representation of each of the following decimal numbers:a. 845b. 15000c. 100d. -923
    8·2 answers
  • . Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police r
    6·1 answer
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • The advancement in speed of transportation is attributed to invention of this device
    8·1 answer
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
  • Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!