1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
5

Which of the following is the correct ordering of operating systems, oldest to newest?

Computers and Technology
2 answers:
Paraphin [41]3 years ago
8 0

Answer:

Explanation:A hope this helps

cupoosta [38]3 years ago
4 0

Answer:

Explanation:

The oldest operating system is Version 6 Unix 1975 and the next is 1BSD 1977, then we can find the Apple DOS 1978, in several years we have Mac OS (System 1.0) 1984, in 1985 was born one of the most popular OS in the world Windows 1.0, and Linux version 0.01-0.1 is the newest in 1991.

Nowadays we can find other system like android, windows 10 or Chrome OS.

You might be interested in
The following is true about SPAM ________.
aev [14]

Answer:

a, c, and d.

Explanation:

Let's examine these options:

a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.

c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.

d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.

8 0
3 years ago
Raul in Colombia can enter data into a spreadsheet. Olivia in England can access the spreadsheet a few minutes later and use Rau
Mila [183]

True, as long as the application is a cloud-based spreadsheet (like Google Docs or MS Office 365), which allows multiple users in any location to view or edit the data with proper access permissions.

7 0
3 years ago
This is not a feature provided by most GUIS.<br> icons<br> windows<br> forms<br> menus
Murrr4er [49]
Maybe menus I’m not sure but good luck
5 0
3 years ago
Read 2 more answers
How should you schedule a meeting with someone in another time zone?
gavmur [86]

If you know what timezone they're in, try to work out what time in your own timezone your free, then tell the other person to do the same. Tell them what times in your timezone and the other can search up what the time is in their own timezone. If there is a specific time when you are both free, use that.

Ex:

You live in the U.S. but you have a meeting with someone in the U.K. You're only free at 4:00pm-6:00pm and they're only free from 10:00am-11:00am. 11:00am in England is 4:00pm in the U.S. so do at that time!

Hope this helps!

7 0
2 years ago
1. Which of the following are considered CAD powerhouses?
allsm [11]

Answer:

1. D.Autodesk and microstation.

2. D. the creation of a computer model, paricularly for purposes of studying.

3. A.internet delivered through standard household phone lines.

4. C.3-D sculptures used to pray for fertility.

5. C.technology.

Explanation:

8 0
3 years ago
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • The answer for this question?
    14·1 answer
  • . Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
    13·1 answer
  • Match the terms with their definitions.
    5·2 answers
  • AddAll - Adds all the doubles in the string with each other. Note every double is separated by a semi-colon. AddAll("1.245;2.9")
    6·1 answer
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • (This is for photography segment exam btw)
    11·2 answers
  • I need a solution for this problem asap.
    7·1 answer
  • Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a
    7·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!