1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
2 years ago
6

What operating system was most commonly used by early personal computers? Apple Mac MS-DOS Windows

Computers and Technology
2 answers:
marshall27 [118]2 years ago
8 0
Windows, its oldest
ale4655 [162]2 years ago
8 0

Answer: well i would say apple but google says...

Explanation: Command

Instructions that tell a computer what to do

GUI

Graphical user interface enabling users to easily interact with their computers.

Backward Compatibility

Ability of an operating system to run programs designed for older operating systems.

Operating environment

An application that makes an operating system easier to use, also known as a shell.

Partition

Section of a hard drive

Freeware

Software that can be downloaded from the Internet at no cost.

Kernel

The core of an operating system that controls its basic functions.

open source

Program or code that is freely available for use or modification.

Tweak

modify, improve upon

Proprietary

Privately developed and owned

What operating system was most commonly used by early personal computers

MS-DOS

Which OS does not provide users with a GUI

MS-DOS

Upgrade to remove ads

Only $2.99/month

Why were computer users excited by the introduction of the first MACs

They could click on pictures to launch applications, They didn't have to memorize lots of commands, They could use a similar interface for different applications.

Which application begins to run when a Mac is booted up?

Finder

The ____ contains software routines that developers use to create a consistent computer environment

Toolbox

This is the main work area on a MAC

Desktop

This contains lists of commands that you can use to tell the computer what to do.

Menu Bar

The Finder can be used to

Delete files, locate files, open applications, organize computer folders and files.

Icons for the most commonly used applications on a Mac can be found here

Dock

These icons cannot be removed form the Dock

Finder, Trash

Why was Windows 1.0 considered an operating environment rather than an operating system

Because it was only a shell; MS-DOS was still the operating system.

What two features distinguished Windows 2.0 from Windows 1.0

The ability to overlap windows, the use of icons.

Upgrade to remove ads

Only $2.99/month

One difference between Windows 3.0 and Windows 2.0 was that users could no longer use MS- DOS commands to operate their computers

False

What was the most notable contribution of Windows 3.11

networking capabilities

When Sabrina began her career as an engineer, she needed an OS with networking capabilities able to process vast amounts of data. For this reason, the OS she used was an upgrade to Windows for Work groups. The OS she used was most likely.

Windows NT

Several years ago Jaime began to operate a small home business. He was very excited by the new features of Windows 95. These new features included.

Backward compatibility, the Start button, Support for longer filenames, the taskbar.

Trevor is a graphic designer. in the past, he had always used Mac computers. However, he purchased a Windows machine when this operating system was released because it supported the use of multiple monitors.

Windows 98

This OS integrated the processing power of Windows NT with the easy-to-use GUI of Windows 98.

Windows 2000

This OS was basically an upgrade to Windows 98 that was designed for home users.

Windows ME

Charlotte was a big fan of her new operating system because she was able to use the same OS at home as she did at work. She likes the new Media Player it introduced and was thrilled with the ease that new hardware devices could be connected. Her new OS was most likely_____

Windows XP

This OS introduced a very cool GUI that had animations and transparencies.

Windows Vista

The newest Windows Os that provides a faster startup and new system search tools is called.

Windows 7

Upgrade to remove ads

Only $2.99/month

Customizable

linux

Most commonly used OS

Windows

proprietary

Windows

Freeware

Linux

Unpaid developers

Linux

___ has code that is freely available for use or modification

Open Source software

Advantages of Linux include

Cost, security, The ability to tweak the application

Disadvantages to Linux include

Customer support provided by volunteers, Not being user-friendly

Linux does not provide a GUI for its users

False

Linux is distributed under GNU GPL. Why is this important?

It states that anyone can copy, modify, and share the program if changes are made public.

Hope this helps.

You might be interested in
Plzzz help! It’s due soon and I can’t figure it out
nignag [31]

Answer:

The answer is A or the first option.

Explanation:

3 0
2 years ago
A researcher plans to identify each participant in a certain medical experiment with a code consisting of either a single letter
trapecia [35]

Answer:

5 Letters

Explanation:

So we need 12 distinct codes made of a single letter or a pair of letters.

What would be the least number of letters?

Lets try with 3 letters A, B and C

The possible combinations are: A, B, C, AB, AC, BC

These are 6 codes and we need 12 so lets try more A, B, C and D

The possible combinations are: A, B, C, D, AB, AC, AD, BC, BD, CD

These are 10 codes and we need 12 so lets try more A, B, C, D and E

The possible combinations are:

A, B, C, D, E, AB, AC, AD, AE, BC, BD, BE, CD, CE, DE

Finally we got 15 distinct codes which are more than 12 so the least number of letters needed are 5.

Using formula:

Four letters = 4C1 + 4C2 = 4 + 6 = 10

Five letters = 5C1 + 5C2 = 5 + 10 = 15

5 0
2 years ago
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
ycow [4]

Answer:

Promiscuous mode

Explanation:

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…

✓ Promiscuous mode

7 0
2 years ago
Add the following methods to the ArrayCollection class, and create a test driver for each to show that they work correctly. In o
maks197457 [2]

Answer:

Attached are screenshots of the working code - baring in mind this only works on mutable Collection types. (ones that can be changed) if you use Collections that don't support this you may experience an Unsupported Operation Exception - but this is expected.

Explanation:

Using Java streams as an alternative for some answers.

3 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Pie

Answer:

Eveidence

Explanation:

<3

7 0
2 years ago
Read 2 more answers
Other questions:
  • The ____ file permission category in unix/linux systems typically entails all permissions and is designated by the letter u.
    7·1 answer
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • In _____ conversion of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simult
    9·1 answer
  • (Complete the Problem-Solving discussion in Word for Programming Challenge 2 on page 404. Your Problem-Solving discussion should
    13·1 answer
  • no one can succeed in his or her career without relying on others for help or opportunities. It’s best, though,
    13·1 answer
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • Remember partially filled arrays where the number of elements stored in the array can be less than its capacity (the maximum num
    14·1 answer
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    10·1 answer
  • Need help please asap
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!