1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
2 years ago
7

In two to three sentences, describe how the first Mac OS was different from the operating systems used by most early PCs.

Computers and Technology
1 answer:
Paha777 [63]2 years ago
8 0

Answer:

DOS: Disk Operating System. DOS was the computer operating system used in the early days of computing and was extended to PC-DOS by Bill Gates when Microsoft was asked by IBM to develop an operating system for the IBM personal computers.

Microsoft Windows. Microsoft Windows is likely the most well-known and common computer operating system in the world today.

You might be interested in
Transition words and phrase in a paragraph
balandron [24]

Answer:

Msms

Explanation:

8 0
3 years ago
Read 2 more answers
If a wire has insulation that allows it to operate in a temperature of up to 194 degrees Fahrenheit, what temperature will the w
zzz [600]
(194°F-32)×5/9
= 90°C
therefore the answer is 90degrees Celcius
6 0
3 years ago
Which step of the design process is the company currently engaged
RideAnS [48]

The answer is pictures

8 0
2 years ago
Which is NOT something that a game producer needs to do?
3241004551 [841]

Answer:

Plan the script, characters, and how the game is played

6 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
Other questions:
  • Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
    12·2 answers
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • ____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, man
    11·2 answers
  • This is question 2.5 Computer Science and I don't understand what is wrong<br><br>​
    15·1 answer
  • __________%of the users have left websites in frustration due to poor navigation.
    13·1 answer
  • What does it mean when your check engine light comes on?
    7·1 answer
  • What is the multiple source test
    15·1 answer
  • Assume that car1 is an instance of the Car class, and that the Car class has a member function named park. Write down the call t
    8·1 answer
  • In Python which is the correct method to load a module math?
    10·1 answer
  • (10 LC)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!