1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kobotan [32]
3 years ago
5

The command prompt found on Windows 7 and Windows 8 is very similar to the interface of what past operating system?

Computers and Technology
1 answer:
pav-90 [236]3 years ago
8 0
The answer is (a.) DOS

DOS stands for Disk Operating System. MS-DOS is the operating system which has a command interface similar to the command prompt of Windows 7 and Windows 8. Among the options, DOS is the only OS which is has a command line interface. Others have graphics.
You might be interested in
A certain string-processing language offers a primitive operation which splits a string into two pieces. Since this operation in
Nostrana [21]

Answer:

Explanation:

First we define define cost(i,j) to be the cost of cutting the string from index i to j. Then,

cost(i,j) = min {length of substring + cost(i,k) + cost(k,j) where i < k < j}

void  s_cut()    

 {

   int l,p;

   int temp=0;

   //ArrayList<Integer> al = new ArrayList<Integer>();

   int al[];

   Scanner s=new Scanner(System.in);

   int table[][];

   ArrayList<Integer> values[][];

   int low=0,high=0;

   int min=0;

   l=s.nextInt();

   p=s.nextInt();

   System.out.println("The values are "+l+"  "+p);

   table= new int[l+1][l+1];

   values= new ArrayList[l+1][l+1];

   al= new int[p];

   for(int i=0;i<p;i++)

   {

       al[i]=s.nextInt();

   }

   for(int i=0;i<=l;i++)

   for(int j=0;j<=l;j++)

       values[i][j]=new ArrayList<Integer>();

   System.out.println();

   for(int i=1;i<=l;i++)

       table[i][i]=0;

   //Arrays.s

   Arrays.sort(al);

   for(int i=0;i<p;i++)

   {

       System.out.print(al[i]+ "  ");

   }

   for(int len=2;len<=l;len++)

   {

       //System.out.println("The length is  "+len);

       for(int i=1,j=i+len-1;j<=l;i++,j++)

       {

           high= min_index(al,j-1);

           low= max_index(al,i);

           System.out.println("Indices are "+low+"  "+high);

           if(low<=high && low!=-1 && high!=-1)

           {

           int cost=Integer.MAX_VALUE;;

           for(int k=low;k<=high;k++)

           {

               //if(al[k]!=j)

               temp=cost;

               cost=Math.min(cost, table[i][al[k]]+table[al[k]+1][j]);

               if(temp!=cost)

               {

                   min=k;  

                   //values[i][j].add(al[k]);

                   //values[i][j].addAll(values[i][al[k]]);

                   //values[i][j].addAll(values[al[k]+1][j]);

                   //values[i][j].addAll(values[i][al[k]]);

               }

               //else

               //cost=0;

           }

           table[i][j]= len+cost;

           values[i][j].add(al[min]);

           //values[i][j].addAll(values[i][al[min]]);

           values[i][j].addAll(values[al[min]+1][j]);

           values[i][j].addAll(values[i][al[min]]);

           }

           else

               table[i][j]=0;

           System.out.println(" values are "+i+"  "+j+"  "+table[i][j]);

       }

   }

   System.out.println(" The minimum cost is "+table[1][l]);

   //temp=values[1][l];

   for(int e: values[1][l])

   {

       System.out.print(e+"-->");

   }

8 0
4 years ago
Complete each of the following sentences by
Minchanka [31]

Answer:

something like

Explanation:

Audio digitization converts analogue

sound a sound wave

Digital audio is stored in binary

The process of audio digitization converts the

sound wave into a series of numbers.

5 0
2 years ago
Read 2 more answers
Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
zheka24 [161]

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

6 0
2 years ago
Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? H
djverab [1.8K]

Answer:

Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.

Explanation:

Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.

Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.

3 0
3 years ago
What should a pie chart represent?
Crazy boy [7]

Answer:

Data that adds up to 100%

Explanation:

7 0
2 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • Smartphones store their operating system software in ________.
    11·1 answer
  • After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices
    10·1 answer
  • __________________ fonts use binary code to define each pixel of the letter to be displayed.
    8·1 answer
  • Consider the following relation:CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt)Assume that a car may be sold
    12·1 answer
  • HELPPPP!!
    8·2 answers
  • Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
    6·1 answer
  • Corinne is on a project team and they are in the project execution phase. She gets a call from a stakeholder to make a change to
    6·1 answer
  • Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?
    5·2 answers
  • Which statement is true concerning user-defined data types?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!