1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
14

In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.

Computers and Technology
1 answer:
marshall27 [118]3 years ago
7 0

Answer:

Option (2) i.e.,  process-control is the correct answer

Explanation:

In the following statement, Process-control screen provides users to send command to the system when the interface of the following users is mainly made up of in the older systems. So, that's why the user interface generally consists of a process-control screen which permits the user to transfer the following details in the system.

You might be interested in
Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrive
Damm [24]

I guess the answer in the blank is processes.

Activities called processes involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.

6 0
3 years ago
Why are the keys on the qwerty keyboard arranged the way they are?
sveticcg [70]
Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
7 0
3 years ago
Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as ta
Montano1993 [528]

Answer:

SAN

Explanation:

A Storage Area Network (SAN) is a high-speed sub network of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are added to a SAN, they too will be accessible from any server in the larger network.

8 0
3 years ago
Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and T
tensa zangetsu [6.8K]

Answer:

All of the above is the correct answer to the given question .

Explanation:

As the Ken olson is the Ken Olson, president of the Digital Equipment Organization . Following are the predictions of  Ken olson of the the technology that are wrong.

  • Lack of creativity regarding the current applications that the user has would consider for the  technology.
  • Lack of creativity regarding the  user or the client has liking.
  • Lack of creativity on what the government would be charging ford. Any of these

So we will choose the Option all these.

8 0
3 years ago
why might you want to use the send to compressed (zipped) folder command before sending four pictures to a friend via email
IceJOKER [234]

It's easier to send the files that way because you don't have to attach them individually, and then your friend won't have to download them individually - they can just download the zip package and have all four right at their disposal.

6 0
3 years ago
Other questions:
  • How do I connect my CSS file and HTML page together? it's just not wanting to work for me. 
    5·1 answer
  • A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
    9·2 answers
  • Ask the user to enter a number n >= 1. There after the user will enter n-1 distinct integers between 1 and n. Thus, the enter
    9·1 answer
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:
    5·1 answer
  • What is the definition of posture<br>​
    7·1 answer
  • Is it true or false and incomplete doing can be saved in Paint​
    15·1 answer
  • Why are mobile apps often easier to develop than desktop apps?
    11·1 answer
  • Types of computer viruses<br>​
    5·2 answers
  • Which of the following makes Super Mario Run unique?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!