What development in operating systems happened between the years 1990 and 2000?

Developers stopped creating GUIs.

Konrad Zeuse developed the Z1 computer.

Batch processing was used for the first time.

The Linux operating system was released.

Answers

Answer 1

Answer:

The Linux operating system was released is the correct answer.

Explanation:

Answer 2

Answer:

The Linux operating system was released.

Explanation:

Took the test


Related Questions

You recently created a new network segment for the development department. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router.
Which of the following would be the best action to take in order to fix the problem?
a. Install and configure a new DHCP server on the development network segment.
b. Configure the router to forward broadcast messages.
c. Implement an IP helper address on the router.
d. Move the DHCP server to the new network segment.

Answers

The option that would be the best action to take in order to fix the problem is to Implement an IP helper address on the router.

What is DHCP server?

A DHCP Server is known to be a network server that is said to quickly gives and appoints IP addresses, default gateways and other network parameters to client devices.

The Internet Protocol Helper (IP Helper) is said to help network administration of the local computer by helping the applications to get back information based on the network configuration of the local computer, and thus it is good to implement it.

Learn more about  DHCP server from

https://brainly.com/question/14407739

a statement or account giving the characteristics of someone or something is called?​

Pa-sagot po pls need ko na po ng answer rn.Thank you so much po in advance

REPORT
✔︎Naghahakot ng pts
✔︎Non sense answer

Brainliest
✔︎RIGHT ANSWER

Answers

a statement or account giving the characteristics of someone or something is called description.

I hope it's help ^^

What level does Drantini evolve? I'm currently grinding on my TI 84 calculator.

Answers

Answer:

Dratini first evolves into dragonair at level 30, which then later on evolves into dragonite at level 55.

Please help. Would appreciate it if you answer soon.

Answers

Answer:

C- He shouldn't trust the website for both reasons

Explanation:

Answer:

c

Explanation:

In the future, where will an increasing majority of data come from?

Answers

In the future, where will an increasing majority of data come from the cloud.

Where will more of data come from?

A lot of Data volumes is said to increase and thus it will move or migrate to the cloud.

Note that the majority of big data experts were said to have agree that the numbers of generated data will grow very fast in the future and it will be one that its growth can come from  social data, machine data or transactional data.

Learn more about data from

https://brainly.com/question/19243813

TRUE or FALSE. 2. 1 Information is a collective term used for words, numbers, facts,

Answers

Answer:

True

it is the best way to get words facts and number

If the user, when asked for his/her date of birth, enters a date in the future, this error should be caught by a ________ check.

Answers

Answer:

The answer is reasonableness.

Your answer is Reasonableness check

Explanation:

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a wonderful day!

Which of the following uses of the Internet is unethical?
purchasing vacation flights online during the evening
purchasing vacation flights online during the weekend
purchasing vacation flights online during work hours
purchasing vacation flights online during a bus ride

Answers

Purchasing vacation flights online during work hours is the  uses of the Internet is unethical. Hence, option C is correct.

What is considered Internet is unethical?

Five immoral applications of computers include media piracy, ransomware attacks, identity theft, financial fraud, and theft of intellectual property.

Unethical: A student plagiarized in their last written paper to boost their GPA. It is unethical to do this since it goes against societal norms and the majority of people would find it disagreeable.

When something is "illegal," it means it violates the law, as opposed to when it is "unethical," which means it is morally wrong. The legal system determines what constitutes an illegal act. In circumstances of unethical behaviour, a man's own conscience is the deciding element. Even if an unethical act may be immoral, it may not be against the law.

Thus, option C is correct.

For more information about Internet is unethical, click here:

https://brainly.com/question/11181425

#SPJ6

The Director of your company is traveling out of the country with the company laptop. Which feature will you need to configure to prevent theft of the laptop

Answers

The feature you need to configure to prevent theft of the laptop is The LoJack tracking software.

What is LoJack a software?

LoJack is a software that is made for Laptops. It is known to be a proprietary laptop theft recovery software that helps one to have a remote access to lock, delete files from their system.

Thiss app can also helps a person to locate the stolen laptop as with the case of the  Director above.

Learn more about laptop from

https://brainly.com/question/26021194

4 atvantage of a computer

Answers

Answer: High Speed. One of the reasons for improvement in the quality of life is personal computer's speed.

Accuracy. Human make errors.

Automation. A lot of tasks can be automated saving a lot of time.

Ease of Access.

Explanation:

What type of a structure is the best way to iterate through the characters of a string?.

Answers

Answer:Using the character iterator is probably the only correct way to iterate over characters, because Unicode requires more space than a Java char provides. A Java char contains 16 bit and can hold Unicode characters up U+FFFF but Unicode specifies characters up to U+10FFFF.

Explanation:

I WILL MARK BRAINLIEST Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what are common tasks performed by Graphic Designers? Check all that apply.

conferring with clients
creating designs, concepts, and sample layouts
scheduling projects for clients
hiring and training new team members
determining size and arrangement of illustrative material and copy
developing graphics and layouts

Answers

Based on the information given, the tasks that are performed by graphics designers are:

conferring with clientscreating designs, concepts, and sample layoutsdetermining size and arrangement of illustrative material and copydeveloping graphics and layouts.

It should be noted that graphic designers confer with clients and

create designs, concepts, and sample layouts.

They also determine the size and arrangement of illustrative material and copy as well as develop graphics and layouts.

Learn more about O'Net on;

https://brainly.com/question/5605847

Answer: Abef.

Explanation:

NEED ASAP WILL MARK BRAILIEST
Many people are concerned about data privacy. Imagine that you were hired to advise a company about how they can be sure that their customers’ data stays private. What would you tell them?

Answers

Answer:

Conduct a data privacy audit. See where and at what level the company is collecting data and check your legal obligations

Minimize data collection and retention. The more data you hold the more open you are to being hacked and the more data you collect the more you have to answer to customers

Secure the data you keep. With examples of software you use for security

Post a public privacy policy

Provide a forum for complaints.

Explanation:

Can someone buy me eddie van der tabs???

Answers

Answer:

No

Explanation:

U cannot exploit people like that

need help!!!!!!!Write a 200 word paper on the new developments, describing how these effect the telescopes, and in what environments these work best.

Answers

Answer:

Development in science and technology have improved many things.It make the trains more better and comfortable . It has replaced steam engine. Development in science and technology have improved our life easier. Because of science and technology modern scientists have made many things like Metro train , Aeroplane , Modern engine etc. Now anyone can go any part of the world because of the help of development in science and technology. Now their are many way for growing crops, It helps the farmer very much.

Explanation:

Which file format cannot be added to a word document.

Answers

Answer:

MP4

Explanation:

Your file, pets.txt, contains the type of pet, weight, and age on each line. An example line is below: dog, 30, 6 Finish the code to read the file and print the contents. import csv inFile = open('pets.txt','r') myReader = for item in myReader: print(item)

Answers

The Python program is an illustration of the file manipulation process

How to complete the program?

From the code segment in the question, we have the following parameters:

The program is written in PythonThe second line of the program is incomplete

The program written in Python where comments are used to explain each action is as follows:

#This imports the csv packacge

import csv

#This opens the file for a read operation

inFile = open('pets.txt','r')

#This prints the file line by line

print(inFile.read())

Read more about Python programs at:

https://brainly.com/question/24833629

What are the ending contents of the array? Choices show elements in index order 0, 1, 2. int yearsList[3]; yearsList[0] = 5; yearsList[1] = yearsList[0]; yearsList[0] = 10; yearsList[2] = yearsList[1];

Answers

The array yearsList is used to hold multiple values and variables

The ending content of the array are 10, 5, 5

How to determine the ending content of the array

The first line of the program declares an array variable of three elements

int yearsList[3];

The second line assigns 5 to the 0 index

yearsList[0] = 5;

The next line assigns the value of the 0 index to the 1 index.

So, we have:

yearsList[0] = 5;

yearsList[1] = 5;

The next line assigns 10 to the 0 index.

So, we have:

yearsList[0] = 10;

yearsList[1] = 5;

The next line assigns the value of the 1 index to the 2 index.

So, we have:

yearsList[0] = 10;

yearsList[1] = 5;

yearsList[2] = 5;

Hence, the ending contents of the array are 10, 5, 5

Read more about arrays at:

https://brainly.com/question/22364342

what is an electronic device that manipulates information, or "data"​

Answers

Answer:

Computer

Explanation:

A computer is a very functional electronic device that has been helping people since decades ago. It has so many functions including the manipulation of data. It means the computer can control volumes of data on its own. Such manipulation means that it can store data in several locations and recover them. It also operates by processing data in a very quick manner.

What month of the year has 28 days?

Answers

Every single month has 28 days. This is a trick question.

Answer: February

Explanation:

Identify the different trends in ICT and use them to their advantage​

Answers

Answer:

The primary new technologies of this decade – Artificial Intelligence (AI), cloud, mobile/5G, cybersecurity, blockchain and the Internet of Things (IoT) – are even more significant and impactful than we may realise.

Explain whats Cropping in your own words (photos) ​

Answers

It’s just means to make sure all of the words in the question are cropped enough that the system will be able to process and read it to give you the answers you need I hope this helped!

;w;) - Actually, cropping is just removing parts of a picture to have the main scene on focus. I was once in a photography class, and I took a picture of the Appalachian mountains.

Where are all my smart ppl at? Help me out!!!
A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?

A.) '=A1+B2
B.) '=A2+B3
C.) '=A2+B2
D.) '=B1+C2

Answers

Answer:

ANSWER IS A2+B3

Explanation:

i am shmart.

Answer:

Most def B.

Explanation:

Hope this helped

Using computer technology to harm another person is known as pharming. cyber-bullying. hacking. vishing.

Answers

Answer:

It is B and C.

But what are these, really?

Cyber bullying is when you use your form of technology to harm another person. It can harm them mentally and sometimes is so bad that it can cause depression.

Hacking is to mess with a server which can cause complicated errors and even breakage of code.

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

I hope this answered your question! Have a wonderful day.

Which of the following is an example of self-awareness?

Answers

Are you sure this is the right subject
5 Examples Of Self-Awareness In Everyday Life

1.) Knowing and accepting your preferences. I am not a morning person. ...

2.) Checking in with your body. Most people don't really notice that their bodies are working for them until they aren't working for them. ...

3.) Choosing to be disciplined (or not). ...

4.) Recapping a conversation. ...

5.) Taking in some beauty.

1. A database table can hold ??

A. A dozen records.

B. Some records.

C. From 0 to billions of records.

D. Two million records.

Answers

Answer:

who are interested and I have been trying to

Why start topology is more reliable than bus or ringtone topology ?

Answers

Answer:

Star topology is used to ease the probabilities of network failure by connecting all of the systems to a central node. ... In contrast to the bus topology, the star topology allows each machine on the network to have a point to point connection to the central hub and there is no single point of failure.

When using the routing information protocol (rip) to transfer data from one network to another, the path ____ is chosen.

Answers

Answer:

When using the routing information protocol (rip) to transfer data from one network to another, the path with the smallest number of hops is chosen.

Which of the following activities Best describes the use of marketing as a form of digital communication
OA An online discount clothing company sends an email about its upcoming sale,
OB. A teacher posts a list of assignments online for students to access
OG A doctor's office emails a patient to remind them about an upcoming appointment
OD. A friend downloads a new song by her favorite artist to her phone.
Reset
Next

Answers

hello!

the answer for this question is:

OA. An online discount clothing company sends an email about its upcoming sale.

hope this helps you!

1. It is the main energy provider in the process of food manufacture in the plant kingdom. *

Answers

Plants make their own food by a process called photosynthesis. Photosynthesis is a process used by plants and other organisms to convert light energy into chemical energy and stored in the form of starch which can be used later.
Other Questions
Please help!!!!!!!!!!! in a for loop, is it possible to use indexing? 1. A parallelogram can be inscribed inside of a circle. a) Alwaysb) Sometimesc) Never2. Circles can be inscribed inside of quadrilaterals.a) Alwaysb) Sometimesc) Never Please help me vote you brainiest How do you simplify this expression? "In the presence of a growing national civil rights movement, President Lyndon Johnson issued a call for strong voting rights laws in 1965. The Voting Rights Act, signed into law in August 1965, suspended literacy tests and provided for the appointment of federal examiners with the power to register qualified citizens to vote. On being signed into law, the act had an almost immediate impact. In South Carolina the number of American Americans registered to vote rose dramatically. In 1964, 38.7 percent of voting-age African Americans were registered. Four years later that number climbed to 50.8 percent. There were also gains in African American political participation. Less than a decade after the passage of the act, the number of African American legislators had risen to thirteen." - from "The South Carolina Encyclopedia" Which of these BEST explains the actual impact of literacy tests in the South? A) They limited the number of uneducated voters. B) They limited the number of Democratic voters. C) They limited the number of Republican voters. D) They limited the number of African American voters. Write sin 64 in terms of cosine. trent drank 3/5 of a gallon of water. nicholas drank 2/3 of a gallon. who drank more water? HELP!! InstructionsDrag and drop each statement of the sample below to match the correct components of an introductory paragraph: Claim, Hook, ThesisStatement, Relevant Evidence, and Transition Sentence. Be sure to use the checklist as you work. The side length of an equilateral triangle is 5 centimeters. Find the length of an altitude. Round your answer to the nearest tenth.The length of the altitude is about centimeters. FAST!!! SOLVE THE POEM TRUE MEANING (Time is a silent file) "I want to say goodbye to the world...you happen to be the world Which of these is the best definition of nihilism In programming,what is a floating point number A)A number with a decimal B)A whole negative numberC)A whole numberD)A positive numberFIRST ONE TO ANSWER CORRECTLY WILL GET CROWNED BRAINLIEST What does this figurative language mean (I'm not saying what IS the figurative language) : "our life's will twist inside out" In which of the following would you multiply both sides of the equation by n?Solve m/n=p for m.Solve m - n = p for m.Solve mn = p for m.Solve m + n = p for m. The simple substances of matter are called:moleculeselementscompounds BRAINLY ENSURED PLEASE HELP!!!!!Select the correct answer from each drop-down menu.A conical circus tent has a 20 ft central pole that supports it. The slant height of the tent is 26 ft long. Explain how to find the angle the tent pole makes with the sides of the tent.The central pole forms a right triangle with the floor of the tent. The_____________of the missing angle is the ratio of the length of the central pole to the length of the side of the tent, which is __________ . Applying ___________, we find that the angle the tent pole makes with the sides of the tent is ____________ .First blank choices: sine cosinetangentSecond blank choices:.77.38.651.30Third Blank choices:arcsinearctangentarccosineFourth blank choices:67.739.649.5Please help!! WILLL GIVE BRAINLIEST TO FIRST CORRECT ANSWER 80 POINTS PLS PLS HELP In this assignment, you will complete the following steps:PART 1: Research reasons for and again the United States helping Germany recoverfrom World War II.PART 2: Choose an assignment option to present your claim, which answers thisquestion: "Should the United States have helped Germany recover from World War11?" what is the answer of 9-4m=19? I need help on this question