1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
6

What control features will you use in the input screens to aid in data entry? give a specific example of how you will use at lea

st eight different control features in the design of the user interface?
Computers and Technology
1 answer:
Tresset [83]3 years ago
8 0
The use of <span>different control features in the design of the user interface are :    </span>Menu bar - displays the main options at the top of the screen.
Toolbar - contains icons that represent shortcuts for executing common commands.
Command button - start an action such as printing a form or requesting Help.
Dialog box - allows a user to enter information about a task that the system will perform.
Text box - display messages or provide a place for a user to enter data.
Toggle button - is used to represent on or off status — clicking the toggle button switches to the other status.
List box - displays a list of choices that the user can select.
Scroll bar - allows the user to move through the available choices.
Drop-down list box - displays the current selection; when the user clicks the arrow, a list of the available choices displays.
Option button - represent groups of options. The user can select only one option at a time; selected options contain a black dot.
You might be interested in
After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
Alexus [3.1K]

Are you surprised by this number – yes

Why: - how the tcpip is routed to reach the destination tcpip

<u>Explanation:</u>

Normally to trace the website tcpip address end-user will use tracert command from dos command prompt. Once tracert command is executed it display the how the web site destination are routed with list of tcpip address. With each of tcpip address system will show the pinging time and in mille seconds.

In case ping tcpip is delay or disconnected then you can identify the problem and find the solution or discuss with network administrator.

For example: - tracert google.com end user will surprise with list of tcpip address.

8 0
3 years ago
Shortcuts can help you complete spreadsheet tasks more efficiently. True False?
Arisa [49]
True, as long as you know what they are and understand them then yes 

i hope this helps 
sincerely, 
Zeus  <span />
3 0
3 years ago
Read 2 more answers
How can a user access the Mailbox Cleanup tools?
antiseptic1488 [7]

Answer:

Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.

Explanation:

8 0
2 years ago
Read 2 more answers
Which are the best examples of costs that should be considered when creating a project budget?
Vlada [557]

Answer:

I would say material costs and hiring costs, idk if that helps or not

4 0
3 years ago
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
2 years ago
Other questions:
  • Which motherboard slot has direct access to the north bridge?
    7·1 answer
  • What will be displayed as a result of executing the following code?
    5·1 answer
  • If a memory reference takes 100 nanoseconds, how long does a paged memory reference take?
    6·1 answer
  • According the Keown book, which Web-based personal financial planning website is known as "the best free way to manage your mone
    6·1 answer
  • What is one of the most helpful things about having a role model?
    10·2 answers
  • Hydraulic systems use liquids because _____.
    14·2 answers
  • 2. (8 points) When creating the Academic Database, there were several instances of data
    11·1 answer
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • Plato Web Tech B Semester Test- I'll mark brainiest for answers to ALL
    9·1 answer
  • private int product(int n) { if(n &lt;= 1) return 1; else return n * product(n-2); } What is the output when product(6) is calle
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!