1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
6

What control features will you use in the input screens to aid in data entry? give a specific example of how you will use at lea

st eight different control features in the design of the user interface?
Computers and Technology
1 answer:
Tresset [83]3 years ago
8 0
The use of <span>different control features in the design of the user interface are :    </span>Menu bar - displays the main options at the top of the screen.
Toolbar - contains icons that represent shortcuts for executing common commands.
Command button - start an action such as printing a form or requesting Help.
Dialog box - allows a user to enter information about a task that the system will perform.
Text box - display messages or provide a place for a user to enter data.
Toggle button - is used to represent on or off status — clicking the toggle button switches to the other status.
List box - displays a list of choices that the user can select.
Scroll bar - allows the user to move through the available choices.
Drop-down list box - displays the current selection; when the user clicks the arrow, a list of the available choices displays.
Option button - represent groups of options. The user can select only one option at a time; selected options contain a black dot.
You might be interested in
Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
alexira [117]

Answer:

Alice's public key

Explanation:A Public key is a key that can be used for verifying digital signatures generated using a corresponding private key which must have been sent to the user by the owner of the digital signature.

Public keys are made available to everyone required and they made up of long random numbers.

A digital signature signed with a person's private key can only be verified using the person's private key.

7 0
4 years ago
How is primary storage different from secondary storage? Select the TWO correct statements.
Zina [86]
Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.
7 0
3 years ago
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web
Zielflug [23.3K]

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

8 0
3 years ago
The % symbol is the remainder operator, also known as the ________ operator.
faust18 [17]

Answer:

It's also called the modulo operator.

6 0
3 years ago
Read 2 more answers
Briefly summarize what vehicle forensics is.
Alenkinab [10]

Answer:

Vehicle forensics is a process that yields a myriad of data potentially helpful to all kinds of investigations, from law enforcement cases, to insurance fraud, to accident reconstruction. Many newer vehicles (generally 2008 and newer) are equipped with an infotainment system.

4 0
3 years ago
Other questions:
  • A boolean variable named rsvp an int variable named selection, where 1 represents "beef", 2 represents "chicken", 3 represents "
    14·1 answer
  • What would I need to make the perfect music video
    10·1 answer
  • 7.
    6·1 answer
  • The negotiators past relationship will affect current behavior if the parties
    12·1 answer
  • Karen has opened a new business and is using Google Display Ads to build awareness of her new products. How does Google Display
    6·1 answer
  • What is a project?
    5·2 answers
  • A(n) ________ software installation copies all the most commonly used files to your computer's hard drive.
    10·1 answer
  • What are the disadvantages of using grid analysis to help make decisions?
    13·2 answers
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • Question 5 / 15
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!