1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
11

Describe at least 15 commands in internal command DOS​

Computers and Technology
2 answers:
kolezko [41]3 years ago
7 0

Answer:

need the point

Explanation:

tnxs (•‿•)(•‿•)(•‿•)

Vinil7 [7]3 years ago
4 0

Answer:

TIME. Displays current time and allows it to be changed. ...

DATE. Displays current date and allows it to be changed. ...

CLS. Clears the screen. ...

DIR. Shows directory information of a diskette: name, size, and the date and time stamp of files. ...

COPY. Copies a file. ...

TYPE. Displays the contents of a file. ...

DEL. ...

REN.

Explanation:

You might be interested in
What does a computer need from people in order to solve problems effectively?
dimulka [17.4K]

Answer:

Computers can solve problems by performing billions of operations per second. A programmer's job is to find solutions. They do this by breaking down problems into easy-to-follow steps for a computer. Programming languages allow people to communicate with computers.

Although computers play an important supporting role as a tool in the discipline, they are just that–tools. ... Given a problem, a computer scientist's goal is to develop an algorithm, a step-by-step list of instructions for solving any instance of the problem that might arise.

Explanation:

Pleeeeeeez mark Me as BRAINLIEST

3 0
3 years ago
Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
vfiekz [6]

Answer:

Encrypted message: CPONYIERTN

Explanation:

Message = ENCRYPTION

keyword = ONE

keyword ONE is of length 3 so the rows are of length 3

Permutation is given by the alphabetical order of the letters in the keyword ONE. Here E appears first in alphabet, then comes N and in last comes O so the order would be 321.

Now the message ENCRYPTION is written in tabular form with width of the rows defined by a keyword ONE

O     N     E

3      2      1

E      N     C

R      Y     P

T       I     O

N

Now this message is read by the column in alphabetic order of the keyword ONE.

Since alphabetic order of E is 1 so the column under E is read first which has the letters:

CPO

Then column under N is read which has the letters:

NYI

In the last the column under O is read which has the letters:

ERTN

So the encrypted message is:

CPONYIERTN

6 0
3 years ago
PLEASE HELP!! WILL MARK BRAINLIEST!!
Kobotan [32]

Answer:

Wow, that’s pretty good question.

I would probably get a vpn because it gives free secure WiFi. And it’s most reliable.

Hope I helped!

7 0
3 years ago
Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
Anni [7]
Yes, windows 7 does support secure boot in UEFI. UEFI allows for backward compatibility. IT can boot a MBR hard drive and provides a BIOS boot through its Compatibility Support Module (CSM) feature.
4 0
3 years ago
How to use 2 tabs at once on my Lenovo yoga book?​
svp [43]
To turn on Multi-window: Method 1: Swipe up from the bottom of Home screen to show Bottom switch, touch Multi-wins. Method 2: Tap Settings on Home screen, tap Multi-window, check Multi-window on the right.
3 0
3 years ago
Other questions:
  • --------------------is a host that runs software to provide information, such as web content, to other hosts.
    9·1 answer
  • Create a structure named planet This structure will contain distance from Earth as an integer Atmosphere, language, people and p
    8·1 answer
  • What are the two ways that assets are
    5·1 answer
  • What key should i press to leave the cell as it orginally was
    9·1 answer
  • What do application in productivity suites have in common
    5·1 answer
  • If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
    6·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Write an algorithm to find the average of three numbers: 10, 20, 30
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!