1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
4 years ago
8

In 1997, microsoft was accused of using a monopoly in operating systems to control the market for _____.

Computers and Technology
2 answers:
MA_775_DIABLO [31]4 years ago
7 0
The market for the label in 1997
Oksanka [162]4 years ago
4 0

Answer:browsers

Explanation:

You might be interested in
Enrico waited ten years to file a cause of action against Frederico for a breach of contract claim. Frederico can use ______ as
ser-zykov [4K]
Time, due to the amount of time between the initial action and the filing of the report, federico could claim the it didn't happen or something
3 0
3 years ago
"identify three data types covered in the database programming with sql course."
ankoles [38]

I guess the correct answer is VARCHAR, DATE, CHAR

VARCHAR - Hοlds a variablе lеngth string (can cοntain lеttеrs, numbеrs, and spеcial charactеrs). Thе maximum sizе is spеcifiеd in parеnthеsis. Can stοrе up tο 255 charactеrs.

DATE - A datе. Fοrmat: YYYY-MM-DD

CHAR - Hοlds a fixеd lеngth string (can cοntain lеttеrs, numbеrs, and spеcial charactеrs). Thе fixеd sizе is spеcifiеd in parеnthеsis. Can stοrе up tο 255 charactеrs

6 0
3 years ago
What are the information ethics associated with IP
Naily [24]

Answer:

The IP stands for intellectual property. And the information ethics related to the IP are the transaction privacy, piracy and the privacy for the ease and giveaways, investigation, namelessness. The trade details must be kept private, and not disclosed to anybody, and the piracy is never allowed. Also, the privacy of all sorts must be ensured for ease and giveaways, surveillance, and confidentiality.

Explanation:

Please check the answer section.

3 0
4 years ago
Why am i doing the investigation​
juin [17]
Because it’s your interest
6 0
3 years ago
How does confidentiality protect people and their online activity?
zlopas [31]
The answer is C Explanation: process of elimination
5 0
3 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • Is the protocol that specifies how web browsers and servers communicate.?
    11·1 answer
  • Finding your style in photography is about ___
    10·2 answers
  • Ashton Auto Place is a car dealer for new as well as used cars of all makes. It uses computerized Transaction Processing System
    7·1 answer
  • What is the information age?
    12·1 answer
  • How do u make a bored builder
    8·2 answers
  • PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
    9·1 answer
  • What are the values of a[k] and a[k+1] after code corresponding to the following pseudocode runs?
    9·2 answers
  • What are the four components of security documentation?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!