1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
8

In 1970's what company developed computers innvations such as mouse. graphical user interface and word processors

Computers and Technology
1 answer:
krok68 [10]3 years ago
8 0
In 1970's Xerox PARC by Alan Kay developed computers innvations such as mouse. graphical user interface and word processors<span>
</span>
You might be interested in
Two organizations cannot have the same name for a computer true or false
liberstina [14]
The answer is False.  Two organizations can have the same name for a computer.  <span>Both </span>computers may<span> have the </span>same name<span>, are on the </span>same<span> subnet, and are on the </span>same domain<span>. But each </span>computer<span> has a unique IP address.</span>
4 0
3 years ago
One of the files you should now have in your fileAsst directory is TweedleDee/hatter.txt. Suppose that you wished to copy that f
Paha777 [63]

Answer:

cp /path/to/source.txt .

is the general format of copying a file to the current directory

cp ~/UnixCourse/fileAsst/TweedleDee/hatter.txt .

You can refer to the current directory with a dot (.)

Explanation:

First, we would like to delete all files in our current directory (commandsAsst directory). To delete the files inside the directory, we would run the following command:

rm -r commandsAsst/*

This command delete the files recursively. Usually, the command for deleting is rm -r. The operator * run rm -r on every file or directory within commandsAsst.

5 0
3 years ago
______ is the software that blocks a user from being able to access your computer.
gavmur [86]
This would be your firewall

3 0
4 years ago
Read 2 more answers
When a cryptogrpahic system is used to protect data confientiality what takes place?
Alex73 [517]

Answer:

Unauthorized users are prevented from viewing or accessing the resource

5 0
2 years ago
I’m so lost. which username do i do.
koban [17]

Answer:

the username you feel like using

5 0
3 years ago
Read 2 more answers
Other questions:
  • ________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
    12·1 answer
  • Add the function min as an abstract function to the class arrayListType to return the smallest element of the list. Also, write
    15·1 answer
  • The area where a blast originates is referred to what perimeter/isolation zone
    10·1 answer
  • Because a vector container uses a dynamically allocated array to hold its elements,
    5·1 answer
  • To encourage good grades, Hermosa High School has decided to award each student a bookstore credit that is 10 times the student’
    11·1 answer
  • To type a small letter "z", you would use the right little finger. (5 points)True False
    9·1 answer
  • Identify an advantage of working in teams.
    8·1 answer
  • A computer follows step-wise instructions to complete any task which is known as?
    5·1 answer
  • What is the grade, as a percentage with two digits after the decimal point, obtained when you graded this 101-question multiple-
    13·1 answer
  • What is output unit of a computer system?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!