1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
9

Guis, x-windows, suntools, and nextstep are built on top of what operating system?

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
8 0
Unix. GUIs were first shown at Xerox PARC (Palo Alto Research Center) in 1973. X-Windows is used on Unix to decouple I/O from processing, in other words what you're working on can be displaying on your computer but executing on another. NeXTstep is Apple's Unix developed on/from/with BSD (Berkley Software Division) Unix. I would assume that suntools were developed on Sun Solaris.
You might be interested in
Sorry, I cant tell you, you need to know
Luba_88 [7]

Answer:

answer a

Explanation:

sorry it’s for the points

7 0
2 years ago
Read 2 more answers
Pollution or waste that is generated from a business is called a
vredina [299]
It is most commonly called "Waste Stream".
8 0
3 years ago
Read 2 more answers
"Which NET command is used on a Windows PC to establish a connection to a shared directory on a remote server?"
Advocard [28]

Answer:

The Tracert command

Explanation:

The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.

6 0
3 years ago
Write a class called Line that represents a line segment between two Points. Your Line objects should have the following methods
mel-nik [20]

Answer:

import java.awt.Point;

public class Line{

private Point point1, point2;

public Line(Point p1, Point p2){

point1 = p1;

point2 = p2;

}

public Point getP1(){

return point1;

}

public Point getP2(){

return point2;

}

public String toString(){

return "[( The " + point1.x + "," + point1.y + "), (" + point2.x + "," + point2.y +")]";

}

public static void main(String args[]){

Line lineObj = new Line(new Point(7,9), new Point(6,2));

System.out.println(lineObj.toString());

}

}

Explanation:

  • Declare the points inside the class Line.
  • Initialize the getters and setters method for the class.
  • Define a toString method that returns the information in a formatted manner.
  • Inside the main method, initialize an object with some values.
  • Display the information by calling the toString method.
4 0
3 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
Other questions:
  • A ___ is the basic collective unit of data in a computer.
    12·1 answer
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
    12·1 answer
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • The keyboard and the mouse____ parts of a computer ​
    8·1 answer
  • Which technique helps you look confident as a speaker?
    15·1 answer
  • ​open-source software is​ ________.
    11·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    12·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!