1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
3 years ago
14

I need an introduction of apple and microsoft

Computers and Technology
1 answer:
JulijaS [17]3 years ago
8 0
During the first Macintosh's development and early years of production, Microsoft was a critical Apple ally. The software pioneer created important programs for Apple's PC in the early '80s. ... Jobs lashed out at Gates during a meeting later that same year and equated Microsoft's plans for Windows to theft.
You might be interested in
_____ allows you to use the internet for making phone calls instead of leasing traditional telephone lines from the phone compan
TEA [102]
Using a browser would help in doing that.
3 0
3 years ago
Discuss the main characteristics of the database approach and how it differs from traditional file systems.
Firdavs [7]

The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.

The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.

6 0
3 years ago
Which of the following represent features of free software licensing? Check all of the boxes that apply.
Iteru [2.4K]

Answer: A :is concerned with defending users’ freedom of use

C:makes source code available for editing

Explanation:

7 0
3 years ago
What is the name of the User-defined function that is mentioned in the code?
Marizza181 [45]

The name of the user defined function is: footballMatch

6 0
3 years ago
Which tools do you use for LinkedIn automation?
borishaifa [10]
<h2>Explanation:</h2>

Automation tools allow applications, businesses, teams or organizations to automate their processes which could be deployment, execution, testing, validation and so on. Automation tools help increase the speed at which processes are being handled with the main aim of reducing human intervention.

Linkedln automation tools are designed to help automate certain processes in Linkedln such as sending broadcast messages, connection requests, page following and other processes with less or no human or manual efforts. Some of these automation tools include;

i. <em>Sales navigator</em> for finding right prospects thereby helping to build and establish trusting relationships with these prospects.

ii. <em>Crystal </em>for providing insights and information about a specified Linkedln profile.

iii. <em>Dripify </em>used by managers<em> </em>for quick onboarding of new team members, assignment of roles and rights and even management of subscription plans.  

6 0
3 years ago
Other questions:
  • Navigational signs on the highway are often which colors?
    10·2 answers
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • X = 0
    15·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • ) A popular PivotChart that is used in Access is (Points : 4) column.
    9·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • Which of the following sentences use personification 
    9·1 answer
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • Which are the 2 main elements that’s make up computer architecture?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!