1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
13

Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.

Computers and Technology
1 answer:
Gnoma [55]3 years ago
8 0
The answer is A it provided a shell for Ms-DOS
You might be interested in
On what menu in Microsoft Word can you locate the Macro feature?
Harrizon [31]

Answer:

View

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode

II. Print Mode

III. Drift Layout

The Microsoft Word developers has made it easy for their users to automate the tasks used frequently through the creation and execution of macros.

Basically, macros comprises of commands and instructions which may be grouped together as a single command to automatically execute a task. You can locate the Macro feature in the View tab of Microsoft Word.

6 0
3 years ago
50 Points being offered for the fastest and most correct response<br><br> How do I fix this?
kolezko [41]
Hi there!

Try resetting your browser, clearing your cache, and rebooting your computer.. If none of these work, or you've already tried these, let me know..

Hope this helps! ☺♥
5 0
3 years ago
Read 2 more answers
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
bogdanovich [222]

Answer:

True

Explanation:

3 0
3 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
A student is going to give a multimedia presentation comparing the novel The Wizard of Oz by L. Frank Baum to the 1939 movie ver
Alekssandra [29.7K]

Answer:

C.

Explanation:

A line graph can show how both the movie and the novel are compared to each other. It can give a visual of both mediums of the story rather than one or the other. Hope this helped :)

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the maximum number of colors that should be used on a slide?
    5·2 answers
  • The CPU is referred to as the ______ of the computer.
    14·2 answers
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • Which statement about trees is false?
    12·1 answer
  • Imported data that maintains a refreshable link to its external source is called ____ data.
    7·1 answer
  • 5. Question<br> The control flag that isn't really in use by modern networks is the<br> flag.
    15·1 answer
  • Help me find the difference between these logos
    10·2 answers
  • Design a class called NumDays. The class’s purpose is to store a value that represents a number of work hours and convert it to
    12·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • What is the advantage of entering metadata for electronic records that you create
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!