1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
9

This operating system was used by individual computers and required users to type commands.

Computers and Technology
1 answer:
In-s [12.5K]3 years ago
6 0

Answer:

MS-DOS is your answer

Explanation:

You might be interested in
In which view are fields set up in MS Access?
Phantasy [73]

Answer:On the Home tab, in the Views group, click View, and then click Design View. In the table design grid, select the field or fields that you want to use as the primary key. To select one field, click the row selector for the field that you want.

Explanation:

7 0
3 years ago
Read 2 more answers
What is the relationship between a tcp and udp packet?
rusak2 [61]

They are both IP packets; both TCP and UDP use IP as their basis. TCP is used to create a channel with flow control, UDP just sends single packets that may get lost.

3 0
4 years ago
nswer the following questions concerning chapter 1:1.1 Which pair of layers are NOT peer layers?a.Transport layer in the sender
frosja888 [35]

Answer:

b.Transport layer in the sender and application layer in the receiver

Explanation:

A peer layer communication is usually used to describe the interactions of different layers among one another in the presence of system communication. If there is a single system, there will be approximately two neighboring layers such that one layer is below while the other is above. Therefore, the answer is option b.

8 0
3 years ago
All HTML5 webpages must begin with the HTML element _____.
Paul [167]

Answer:

yes, an HTML webpage must begin with an HTML element

Explanation:

<HTML> <!-- Website Content --> </HTML>

3 0
2 years ago
In a networked environment, each computer on the network can access the hardware on the network. True of False?
kakasveta [241]
Access independ on your network it secure or not if not secure you can access to any hardware on the network
7 0
4 years ago
Other questions:
  • Question 1
    9·1 answer
  • When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of
    8·1 answer
  • You have just used a command that produced some interesting output on the screen. You would like to save that information into a
    10·1 answer
  • A must decode this code. I guess is not a Cesar. The last line is a email adress.
    15·1 answer
  • Templates allow for the quick creation of _____.
    7·1 answer
  • The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
    10·2 answers
  • Provides images of weather systems, and helps to track storms at different altitudes
    7·1 answer
  • What happens when the ignition is turned to accessory
    15·1 answer
  • What kind of power does Tesla Model S, 3 X, and Y use?
    8·2 answers
  • If you selected row 17 and then selected Insert Sheet Rows, row 17 _____.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!