1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
12

These operating systems were referred to as command-based. A.Android and MS-DOS B.iOS and Windows C.LINUX and UNIX D.MS-DOS and

UNIX
Computers and Technology
2 answers:
jolli1 [7]3 years ago
5 0

Answer:

D.MS-DOS and UNIX

Explanation:

The oldest versions of Windows Operating Systems used MS-DOS. MS-DOS was purely command-line based OS. MS-DOS did not have GUI and users were required to learn command lines to help them navigate through, open, and manipulate files. MS-DOS is no longer used. UNIX was also a command-line based operating system when it was initially built in the 1960s. It still is but it supports both GUI and CLI. Unix, in my opinion, is hands down the best and most powerful CLI based OS to have ever been built.

Alex787 [66]3 years ago
4 0

Answer:

The correct Answer is D. MS-DOS and UNIX

Explanation:

The Character User Interface (CUI) operating system is referred to as command-based. It is a text-based operating system, were text is used for interacting with the software or files by typing commands to perform specific tasks. The command line operating system uses only keyboard to enter commands. The command line operating systems include DOS and UNIX. The advanced command line operating system is faster then the advanced   GUI operating system.

<em>A.Android and MS-DOS</em>

This option is wrong. Android Operating is GUI

<em> B.iOS and Windows </em>

This option is wrong. Windows is a GUI OS

<em>C.LINUX and UNIX</em>

This option is equally wrong. Linux is a GUI OS

<em> D.MS-DOS and UNIX</em>

This is the correct answer

You might be interested in
The ________ of the operating system enables the user to communicate with the computer system. Select one:
mojhsa [17]
The user interface (correct answer is a)
8 0
3 years ago
What is the proper way to name the range of cells located in colum A row 3 through colum C row 7?
LenKa [72]

Answer:

it is C

Explanation:

6 0
3 years ago
Read 2 more answers
_____ is an example of a Google filetype operator.​
shtirl [24]

Answer:

d. all of the above

Explanation:

Google filetype operator enables restricting the search results to the specified file type. For example if you are searching for Eiffel Tower and you want to restrict the results to pdf files then the query will be of the form Eiffel Tower filetype:pdf . Similarly for text file results you need to specify the search query as Eiffel Tower filetype:text. The Google filetype operator supports several different file types.

3 0
3 years ago
Suppose a program is running on a distributed-memory multiprocessor. There are 1,000 instructions in the program and 80% of inst
Licemer1 [7]

Answer:

2125 ns.

Explanation:

First of all Execution Time = Number of Instructions * CPI * Clock Cycle

Number of Instructions = 1000

CPI = 0.5

Clock Cycle = 1/clock rate = 1/4GHz = 0.25 * 10-9 s

So Execution Time = 1000 * 0.5 * 0.25 * 10-9

Execution Time = 125 * 10-9 s

Execution Time = 125 ns

Now 20% of the instructions take 10 ns extra time for remote communication.

1 instruction takes 10ns

so 20% of 1000 = 200 instructions will take 200*10 = 2000ns

So Total Execution Time = 125+2000 = 2125 ns.

5 0
4 years ago
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi
slava [35]

Answer: VLAN

Explanation: VLAN(Virtual local area network) is the network technology that lets the user to connect in a virtual( fake) environment and displaying as if they are working in the LAN environment.

It is the used for obtaining the scalability and protection of information while communication. It also helps in adapting the change that occurs in the network and  nodes of the server. Thus, VLAN is the network that should be used in the business to keep sensitive data secure and hosts of the network to connect and communicate .

3 0
3 years ago
Other questions:
  • _____ is the unauthorized entry into a computer system via any means
    9·1 answer
  • Why is a networked system a benefit?
    7·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • You have just taken over management of a server on which the previous server administrator has set up several server components,
    8·1 answer
  • C Programming:
    11·2 answers
  • The stack pop operation
    10·1 answer
  • Which attribute defines the file name for the specific image in an image tag??
    13·1 answer
  • Taylor develops a prototype for a new smartphone. It only includes code, a way to process the input, a memory card, and a microp
    11·2 answers
  • Convert pounds to ounces.
    11·2 answers
  • For our computer club in school, we are making a discord server and seeing who can get the most members. I am making an Anime Se
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!