1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
6

What is Microsoft first product

Computers and Technology
2 answers:
Alenkasestr [34]3 years ago
3 0

Answer:  Xenix

Explanation:

Rashid [163]3 years ago
3 0

Answer:

Xenix-used as a word processing tool.

Explanation:

You might be interested in
How could this<br> innovation change society?
Lisa [10]

Answer:

invention such as new tool devices progress and resistance benefits to society inventions selfie lies and provide new way to build move communicate heal learn and play

7 0
2 years ago
Explain how you would define a variable named balance, assuming that it will only be accessed in a single function.
olganol [36]

The ways to define a variable named balance, if only it can be accessed in a single function are:

First the variable name need to begin  with a letter or an underscore character (_).

Note that the variable name is one that cannot begin with a digit.

Then make sure that the  variable name can only have alpha-numeric characters and underscores ( a-z, A-Z , 0-9 , and _ )

Note also that  Variable names are the ones that are said to be case-sensitive (age, Age and AGE are said to be different variables)

<h3>How do you define a variable name?</h3>

The Rules for naming a variable is that  A variable name is one that need to have only have letters (that is uppercase and lowercase letters), digits and also an underscore. T

Note that the first letter of a variable can be letter or an underscore.

Learn more about variable name from

brainly.com/question/13162404

#SPJ1

8 0
1 year ago
There are 40 houses if company y provides electricity to 2/5 of the houses how many houses as company y provide electricity to
yulyashka [42]
The article for the assignment I need help with part 2xexbixneixe
6 0
3 years ago
Count from 1 to 20(base10) using the following bases: 8, 6, 5, 3.
Licemer1 [7]

Answer:

Base 8:

1, 2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 20, 21, 22, 23, 24

Base 6:

1, 2, 3, 4, 5, 10, 11, 12, 13, 14, 15, 20, 21, 22, 23, 24, 25, 30, 31, 32

Base 5:

1, 2, 3, 4, 10, 11, 12, 13, 14, 20, 21, 22, 23, 24, 30, 31, 32, 33, 34, 40

Base 3:

1, 2, 10, 11, 12, 20, 21, 22, 100, 101, 102, 110, 111, 112, 120, 121, 122, 200, 201, 202

Explanation:

When counting on a certain base n you can only use n numerals (including the zero). So, if you count in base 8, you have 8 numrals, these are 0, 1, 2, 3, 4, 5, 6 and 7. The numeral 8 does not exist in base 8 the same as there is no numeral for 10 in base 10. When you're counting beyond the single numerals you add a 1 to the numeral in the column in front (which starts at zero) and reset the previous column.

4 0
2 years ago
In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.
marshall27 [118]

Answer:

Option (2) i.e.,  process-control is the correct answer

Explanation:

In the following statement, Process-control screen provides users to send command to the system when the interface of the following users is mainly made up of in the older systems. So, that's why the user interface generally consists of a process-control screen which permits the user to transfer the following details in the system.

7 0
3 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • 2. Write a simple program in C++ to investigate the safety of its enumeration types. Include at least 10 different operations on
    5·1 answer
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
    13·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 1024-byte 4-way set as
    5·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
  • Which of the following could be part of an algorithm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!