1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
2 years ago
14

State five differences between Dos and Windows.​

Computers and Technology
1 answer:
nalin [4]2 years ago
6 0
1. DOS is single tasking OS. Windows is multi-tasking OS.

2. DOS consumes quite low power. Windows consumes high power.

3. DOS memory requirements are quite low. Windows memory requirements are quite high as compared to DOS.

4. DOS has no support for networking. Windows supports networking.

5. Multimedia is not supported in DOS. Windows supports multimedia likes games, videos, audios etc.
You might be interested in
For all of you who listen to podcasts, when do you usually find time to do so?​
ss7ja [257]
Morning and afternoon commute times are obvious blocks of time that you can assume are used for listening to podcasts, but the answer will obviously vary widely based on individual habits and schedules.

Hope this helps
7 0
3 years ago
A10:A20 Refer to values in
Keith_Richards [23]
The range of cells in column A and rows 10 through 20
8 0
3 years ago
Julian downloaded some of the music he created to play for his friend. Julian's friend wore headphones to listen to the music. A
egoroff_w [7]
B) output device

bc you’re using them to listen to something
6 0
3 years ago
Read 2 more answers
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
__________ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which ar
DIA [1.3K]

Answer:

Static

Explanation:

A computer or system administrator who want packets to be filter have to set or configured a filtering rules which will enable and allow the firewall to decide on which of the packets that will be allowed to function and the packets that will be denied not to function to be developed and as well installed on the firewall have to make use of what is called STATIC FILTERING reason been that STATIC FILTERING make it of necessary that the filtering rules should be developed and installed with the firewall.

6 0
3 years ago
Other questions:
  • A blood bank maintains two tables - DONOR, with information about people who are willing to donate blood and ACCEPTOR, with info
    10·1 answer
  • What is the difference between 1080p and 2k?
    14·1 answer
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • Need this!!
    11·2 answers
  • The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
    15·2 answers
  • Assume you're using a three button mouse. To connect shortcut menus, you would what
    6·1 answer
  • When selecting a color scheme for a project which two things should you consider?
    8·1 answer
  • Citing Wikipedia as a reference is not considered a good practice because 1.leverages a neutral point of view. 2.hosts unopinion
    8·1 answer
  • My serious question that needs answering pronto!!!
    11·1 answer
  • Use the drop-down menus to complete statements about audio file formats.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!