1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
12

This OS was basically an upgrade to Windows 98 that was designed for home users.

Computers and Technology
1 answer:
matrenka [14]3 years ago
5 0

<u>Answer:</u>

<em>Windows ME</em>

<u>Explanation:</u>

In the word Windows Me, Me stands for Milleneum. It is GUI based OS developed by Microsoft Corporation. <em>This is the first Home computer OS and it had IE 5.5, WMP version 7, etc. </em>

But this was not that much successful and this was the last OS released for Windows 9X series. Though its GUI based, it still looks like DOS OS only.

<em>The successor of this is Windows XP which became very popular and it was used by many computer users and it included windows NT Kernel.</em>

You might be interested in
What is the main function of a CD-RW.​
otez555 [7]

Answer:

A CD-RW (which stands for Compact Disc ReWritable) is a Compact disc that can be recorded and erased multiple times. It can hold data or music. Most of the time it will hold data, since many CD players can not play CD-RWs. During its development, the format was known as CD-E, which stands for Compact Disc Erasable.

5 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Select the correct answer.
Phoenix [80]
Data availability is the one related to the server being down.
4 0
3 years ago
How can an administrator initiate a system state recovery using the command line?
LUCKY_DIMON [66]

A leader creates a system state recovery utilizing the power cord wbadmin start system state recovery.

<h3>What is the power to start a system state restoration?</h3>
  • Windows has a built-in tool that lets you back up and repairs a server's system state, which is quick and easy to use.
  • The Wbadmin can be operated with the Start System State Backup order to create a blockage of the system state for a computer and the Start System State Recovery order to restore the system state.
  • Use the order -backuptarget:\\servername\sharedfolder\ to store system state backups.
  • Runs the power without prompts to the user.
  • The System State information reference in Backup Manager lets you support the design of your working system and vital system features such as the Registry, boot files, SYSVOL directory, and Active Directory.

To learn more about, start system state recovery, refer to:

brainly.com/question/24180931

#SPJ4

4 0
2 years ago
Which of the following statements is true of San serif fonts?
Vsevolod [243]
They are easier to read on a computer screen
7 0
3 years ago
Read 2 more answers
Other questions:
  • The stack ADT may be implemented with
    13·1 answer
  • What is a PowerPoint template?
    6·2 answers
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • List the instructions of how you would make a PBJ sandwich as a series of five (5) steps (tasks) in the first column Complete th
    14·1 answer
  • Fill in the blank with the correct response.
    5·2 answers
  • Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
    7·1 answer
  • Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the info
    10·1 answer
  • Yo need help can someone plz help
    7·1 answer
  • If Z=52 and ACT=48 then BAT=​ with explanation??​
    12·1 answer
  • What is the purpose of linking text boxes?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!