1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
5

Which OS does NOT provide users with a GUI?

Computers and Technology
1 answer:
vesna_86 [32]3 years ago
3 0
The answer is C ms-dos
Side note:
GUI means graphical user interface. In other words, that means it looks pretty and has cool buttons, animations and cute stuff. MS-DOS is just a black screen with words on it. Definitely not cute or cool.
You might be interested in
Mengapakah wanita hamil memerlukan jumlah nutrien yang lebih banyak berbanding wanita tidak hamil.
Elan Coil [88]

Answer:

Because of the baby in the womb

Explanation:

Remember, a pregnant woman carries a life (the fetus) in her womb, and the unborn child depends on its mother for food. Such a complex and fascinating stage of pregnancy requires the mother to be well-nourished or else the child may die or suffer some health problems; which may even affect the mother.

5 0
2 years ago
.Visual Studio .NET’s ___________ feature displays all the members in a class
Alex

Answer:d)Intellisense

Explanation: Visual Studio.NET is the tool for the development of the application .Intellisense is the type of code that is found in the Visual Studio.NET which is used for the intelligent completion of text or code. The factors present in the Visual studio NET has are tracking of the values, increasing the understanding of code,presenting the class member etc.

Other options are incorrect because real time error checking is for the checking of the error raising at the time of execution, Quick info is for gaining data rapidly and outlined code are for display of the hierarchical structure of codes.Thus, the correct option is option(d).

3 0
3 years ago
Why is it important to follow a consistent naming convention for variables?
Vitek1552 [10]

Answer:

today I am going to be out for the job interview so if I will make it happen I am going to New Orleans this week to get the kids to work on the spot and I can get ready to go out to dinner and I can make a few more people

4 0
2 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
2 years ago
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwi
serg [7]

Answer:

True

Explanation:

BSA (The Software Alliance), styled as "BSA | The Software Alliance," is a trade group founded by Microsoft in 1988 that attempts to eliminate software piracy of the software made by its members. Many major software makers are part of the BSA, including Adobe, Apple, Autodesk and Oracle, among others.

6 0
2 years ago
Other questions:
  • One random part of Chess is whether the white side or the black side moves first? A. True B. False
    10·2 answers
  • Types of operating systems
    5·2 answers
  • First write a method to calculate the greatest common divisor (GCD) of two positive integers using Euclid’s algorithm (also know
    10·1 answer
  • What is anatomy of software house?
    10·1 answer
  • Which grapgic element loads faster when used with text or audio
    7·1 answer
  • I analyze data, as a consultant, for companies making important business decisions. In order to get my point across, which of th
    11·1 answer
  • Drag each tile to the correct box.
    8·2 answers
  • You need to extract data from the system your predecessor created. you discover tables have been created according to the third
    7·1 answer
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • Which of the following best describes the basic purpose of the internet?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!