1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
3 years ago
12

One difference between Windows 3.0 and Windows 2.0 was that users could no longer use MS-DOS commands to operate their computer.

Computers and Technology
1 answer:
Kipish [7]3 years ago
6 0

the answer is false.

You might be interested in
Urgent ..algorithm and flowchart to check weather a number is odd or even ???​
arlik [135]

Answer:

if it's 0 then the number is even.else number is odd

Explanation:

if it's divisible by 2.then the reminder will be 0,

then the number is even.

thanks

3 0
3 years ago
Read 2 more answers
What is the term given to the controls that let you interact with an operating system?
Sophie [7]
Inputs are the contols that let you interact with an operating system.
4 0
4 years ago
What are preconceptions?
anastassius [24]
An idea or statement  that you had previously or earlier.

6 0
4 years ago
Read 2 more answers
Question 4 (2 points)
Kay [80]

Answer:

Syntax

Explanation:

Syntax errors include misspelled words or missing code.

Logic errors cause the program to operate incorrectly,

Runtime errors occur while running a computer program.

7 0
2 years ago
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
Other questions:
  • Can anyone drink and drive safely?
    13·2 answers
  • Most sim cards allow ___________ access attempts before locking you out.
    10·1 answer
  • During the analysis phase of the SDLC the systems analyst will decide how the hardware, software and network infrastructure, use
    5·1 answer
  • Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
    7·1 answer
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • Maggie is preparing a business report. Which types of keys will she use to type out words and numbers?
    9·1 answer
  • This instrument records seismic waves on a roll of paper. The recording is called a(n) _____.
    8·1 answer
  • The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those use
    8·1 answer
  • What are the specifications of mine shaft head gear​
    11·2 answers
  • What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!