1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
10

These operating systems were referred to as command-based.

Computers and Technology
2 answers:
Doss [256]3 years ago
3 0

{\underline{\boxed{\bf{MS - DOS \:  and \:  UNIX}}}}

german3 years ago
3 0
It is Linux and Unix!
You might be interested in
In cell B20, enter a function to calculate the average attendance for 2018
coldgirl [10]

Answer:

=Average(Cell Range)

Explanation:

The function that is used to calculate the average value of a data set or the mean in Ms. Excel is;

AVERAGE function.

In the cell B20, Enter the function;

=Average

Then select the entire attendance for 2018 as the arguments of the function. Finally, press the enter key on your keyboard.

6 0
3 years ago
The ________ method displays a message to the user and contains one button.
jolli1 [7]
<span>The <em><u>message box</u></em> method displays a message to the user and contains one button.</span>
6 0
3 years ago
Rhea has been asked to interview the new CEO of an energy company. She has scheduled a meeting with him in the company’s meeting
vovikov84 [41]
The correct answer would be B
7 0
3 years ago
Read 2 more answers
Best way to build a model bridge
DanielleElmas [232]
Personally, i would use a 3-D printer, but you can use any material that you have, and have an example next to you for reference if you aren't going to 3-D print.

7 0
3 years ago
Read 2 more answers
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
4 years ago
Other questions:
  • Brian is testing a banking application. He enters an input and expects a certain output. What is the actual output of the applic
    11·1 answer
  • When a dynamic array with a class for a base type is declared, which constructor is called?
    5·1 answer
  • ________ is a program that runs on a computer to manage and control a computer's activities.
    11·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • You should structure the<br> first before you search for a relevant picture.
    11·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • Digital on a smart phone means the camera is actually zooming in on the photo itself not the subject that you are shooting true
    8·1 answer
  • Is Missouri a free state or a slave state​
    13·2 answers
  • PLS HELP MEE it's due in 2 minutes​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!