1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
2 years ago
6

Contemporary pc operating systems and application software use a​ ________, which makes extensive use of​ icons, buttons,​ bars,

and boxes to perform tasks.
Computers and Technology
1 answer:
V125BC [204]2 years ago
3 0

Contemporary pc operating systems and application software use a​ Graphical User Interface (GUI), which extensively uses​ icons, buttons,​ bars, and boxes to perform tasks.

What is a GUI?

A system of interactive visual components for computer software is known as a GUI (Graphical User Interface).

Compared to MS-DOS and the shell of Unix-like operating systems, a GUI is more user-friendly than a text-based command-line interface.

Objects like icons, cursors and buttons are included in a GUI. Sometimes these elements are enhanced with visual effects like transparency and sounds.

Learn more about Graphical User Interface here: brainly.com/question/14758410

#SPJ4

You might be interested in
Why do primitive types have ranges of values? what determines the range of the data type?
Alexxx [7]
What determines the range of primitive data types is a combination of the number of bytes that is allocated to them and if there's any encoding.

Not too long ago, it was normal for an integer to receive four bytes of memory. An unsigned integer would also receive four bytes of memory. The unsigned int  had a range of 0 - (2^32 - 1) because it could only be used for positive integers and could use all 32 bits. An integer has a range of (- 2^31 through +2^31 - 1). The 32nd bit is uses as a sign bit (0 for positive, 1 for negative).

Just for thoroughness: when an int is negative, it's stored as the two's complement of it's absolute value.
5 0
3 years ago
__________ has become a widely accepted evaluation standard for training and education related to the security of information sy
kirill115 [55]
NSTISSI NO 4011 has become a widely accepted evaluation standard for training and education related to the security of information system. The standard is directed at information security professionals who are experts in identifying system vulnerabilities, investigating system security, documenting, analyzing and evaluating system security technology policies.<span />
4 0
3 years ago
If you could create a social network, what would it be like? What would make it so special about the others? (If you want you ca
patriot [66]
Be able to contact and connect with other users. be able to share what your doing.
7 0
4 years ago
HELP ASAP!! WILL MARK BRAINLIEST
lesya692 [45]

Answer:20*i

Explanation:

Because the size will expand as its being written out to then have i

4 0
3 years ago
Some example questions include: ""How does multithreading affect the throughput of a GetFile Server hosting many very large file
zhenek [66]

<em>How does multithreading affect the throughput of a GetFile Server hosting many very large files?</em>

Answer:

It create multiple threads of large file which eventually causes in slowing down the speed of server which results in slower response time.

<em>How does multithreading affect the average response time for a GetFile server hosting a few small files?</em>

Answer:

Multiple threads in smaller files result in rapid response time and enormous process speed in small files.

6 0
3 years ago
Other questions:
  • Our company is only interested in purchasing a software upgrade if it leads to faster connectivity and data sharing. The old sof
    7·1 answer
  • What type of scientists studies tree rings to determine the history of an area?
    9·2 answers
  • Jose needs to find out how to delete cells from his workbook.
    12·2 answers
  • Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
    15·1 answer
  • Select the correct answer
    5·2 answers
  • Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
    6·1 answer
  • PLSSS HELPP IM DESPERATE!!!
    11·1 answer
  • WILL GIVE BRAINLEST!!!!!!!! 10 POINTS!!!!
    5·2 answers
  • Edhesive 8.5 code Practice help me pls
    15·1 answer
  • Before a computer can use a router, what configuration information must it be provided?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!