1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
13

Why was Windows 1.0 considered an operating environment rather than an operating system? because users were unable to use a mous

e to interact with the OS because users were unable to use a mouse to interact with the OS because it crashed frequently because it crashed frequently because it was only a shell; MS-DOS was still the operating system because it was only a shell; MS-DOS was still the operating system because it didn't support the running of multiple programs
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
7 0

Answer:

Because it was only a shell; MS-DOS was still the operating system

<u><em>Hope this helps!</em></u>

<em>-Isa</em>

You might be interested in
By changing the field size for text to the maximum number necessary,
Inessa05 [86]

Answer:

The correct option is;

A. The file will not take up as much space on the database

Explanation:

Changing the field size of a field that does not contain data limits the size of taken up by the data values added to the field. The field size for text field determines the disc space that each value of the field allowed to take up by Access

When the field size is changed for fields containing data, the data values in the field that have values higher than the maximum field size are truncated while the field size of subsequent data are limited as stated above.

8 0
3 years ago
The first real computer was an abacus?
kotegsom [21]
True, false, false. Hope this helps:)
3 0
3 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
Rasek [7]

Answer:

Answer explained below

Explanation:

When disabling inherited permissions on an object, if you select Remove all inherited permissions from this object then you lose every user or group assigned to the folder.

This will delete all existing permissions, including administrator accounts, leaving you a blank slate to apply your own permissions to the folder.

5 0
3 years ago
What are the five generations of computers?​
inysia [295]

Answer:

First Generation, Second Generation, Third Generation, Fourth Generation, Fifth Generation

Explanation:

First Generation- Vacuum Tubes

Second Generation- Transistors

Third Generation- Integrated Circuits

Fourth Generation- Microprocessors

Fifth Generation- Artificial Intelligence

4 0
3 years ago
Other questions:
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    13·2 answers
  • The concept of vertical farming allows agriculture to occur when there is not enough___Available .
    13·1 answer
  • Which statement describes what happens if multiple users make changes simultaneously to a presentation when
    10·1 answer
  • Which fingers should you use to type the reach keys?
    12·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • What is missing in the following program in order to have the output shown?
    15·2 answers
  • When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
    10·1 answer
  • What can a user modify on a business card using the Edit Business Card dialog box? Check all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!