1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
3 years ago
5

1. What does MS-DOS use for input?

Computers and Technology
1 answer:
Ket [755]3 years ago
5 0

1. The answer is Command-line base

MS-DOS is a single user, single tasking OS that use a command line interface. MS –DOS is the perfect example of a command line interface. CLI is a text based interface used by operating systems and software and performs particular tasks by entering commands. Unlike the GUI (Graphical User Interface), the CLI uses a very easy mechanism which is not user friendly.  

2. The answer is carry electrical current

Transistors are semiconductor devices used to control the flow of electricity in circuits. They contain three layers of silicon that are used to amplify or switch electric currents. They are very fundamental in modern electronic devices and are considered one of the greatest inventions in modern history. In small quantities, transistors are used to make simple switches and digital logic. In huge quantities, transistors are interconnected and combined into small chips that create complex ICs, computer memories, and processors.

3. The answer is True

A peripheral device such as a keyboard, a mouse, or a printer is a hardware input or output device that gives the computer additional functionalities and serve as an auxiliary computer device. They are commonly known as I/O devices because they provide input and output information for the computer.

4. The answer is A: Interacts with or sends data to the computer

A peripheral device as mentioned above is used to input information into and get it out of the computer. In addition, an input device sends data, information, or instructions to the computer. Examples of input devices include, keyboard, mouse, graphics tablet, game controller, read only memory, and many more.

5. The answer is doc .

Doc file extension is the general default binary and XML-based format for Word 97 all the way to Word 2019. This file extension can contain formatted texts, tables, images, page formatting, and graphs. Depending on the versions of the Microsoft Word, the standards for the DOC extension change slightly from .doc to .docx


You might be interested in
Resolution of bitmap graphics is typically measured in
Free_Kalibri [48]

Answer:

Pixels

Explanation:

6 0
3 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
HELP ASAP- YOU GET BRAINLIEST!!
agasfer [191]

Answer:

BLOb

Explanation:

Binary Large Objects (BLOb) data is capable of storing data in the form of images, audio, and video clips.

3 0
4 years ago
What are the main approaches for dealing with deadlock?
alina1380 [7]

Answer:

Deadlock ignorance

Deadlock prevention

Deadlock avoidance

& Detection and recovery

Hope This Helps!!!

3 0
3 years ago
What are the important role that health care workers play in documentation, confidentially, maintenance and credibility of the m
Anna007 [38]
75. Health care workers are those persons who makes sure that they documented everything about their patient’s health problem. They also makes sure that they maintain those documentations and make sure the credibility and confidentially of an individual that undergone their care. It is their responsibility that this is keep confidential based on their patient’s request and also in their job’s duty. Once a health care worker divulge any confidential information, he or she can be given by a person a case in the court.
8 0
3 years ago
Other questions:
  • In what era did plants begin to flourish?
    9·1 answer
  • Write a program that declares an array of size 1,230 and stores the first 1,230 prime numbers in this array. The program then us
    6·1 answer
  • Annalise received financial aid offers from two universities. Financial Analysis for Option A Costs per Year Financial Aid Packa
    8·2 answers
  • What is the importance of personal computers in connecting to the internet ?
    13·2 answers
  • The large program that controls how the CPU communicates with other components is the​
    9·1 answer
  • If the user loads this graphic in a text only browser how will the browser describe it?
    11·2 answers
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • What should you commit to your family members?
    10·1 answer
  • What are the similarities and differences in Yahoo International<br> Versions?
    11·1 answer
  • 3) Controls on a form or report that describe each field—often the field name—in the underlying table
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!