1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
4 years ago
7

When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing

Computers and Technology
2 answers:
julsineya [31]4 years ago
5 0
Your answer would be D, graphical user interface. Hope this helps!
Artemon [7]4 years ago
3 0
The answer is A hope this helped :) 
You might be interested in
Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
Sergio039 [100]

Rebecca should Determine whether fixing the first problem caused the second problem.

d. Determine whether fixing the first problem caused the second problem.

<u>Explanation:</u>

Rebecca completed work on the computer and is verifying the functionality of the system when she finds a new problem.

Keeping in mind the fact that Rebecca's company's policy is that all problems need to be reported and given a priority code before they can be assigned to someone, she should go ahead and determine whether fixing the first problem caused the second problem to arise.

Although the company's policy does not approve of this, before reporting a problem she should check whether the problem is worth the effort. As mentioned, the problem is not urgent and can easily be fixed, she should go ahead with this option.

7 0
3 years ago
PLEASE HELP ME ASAP!!!!
coldgirl [10]

First party insurance: Loss due to laptop theft, loss due to interruption in business activities due to website failure

Third party insurance: cost of lawsuits filed against the policyholder, fees of a special programmer investigating a cyber fraud, expenses of providing notifications of the cyber attack to clients and employees

8 0
3 years ago
The top-level domain (tld), also known as the ________, typically identifies the type of organization an address is associated w
Contact [7]

The top-level domain (TLD), also known as the domain suffix, typically identifies the type of organization an address is associated with . (dot)

The top-level domain is the last part of the domain name i.e the part after the final dot. The tld identifies what kind of organization the domain belongs to and classifies its purpose. For example, “.com “is for commercial businesses and “.gov” is for governmental institutions.

There are three main types of top-level domains;

  1. Generic TLDs: They cover the most common domain names like “.com”,” .net” and “.org”.
  2. Country-code TLDs: These domains are reserved for use by certain countries and states like “.uk”, “.pk”, “.au”.
  3. Sponsored TLDs: These are usually representative of any geographical or professional communities with a delegated sponsor who represents them.

You can learn more about domain name at

brainly.com/question/10314541

#SPJ4

3 0
1 year ago
What has been your background with using Windows-based computers?
Radda [10]

Answer:

Anything i desire.

Explanation:

4 0
3 years ago
Read 2 more answers
5. Name the special window that displays data, when you insert a chart.
AVprozaik [17]

Answer:

A.Datasheet

Explanation:

I hope it's helpful

7 0
3 years ago
Other questions:
  • Which of the following is not a standard method called as partof the JSP life cycle?
    5·1 answer
  • Lindsay owns a candy store that typically makes all if its sales to tourists visiting a nearby zoo. Why might she decide to set
    14·2 answers
  • Technological progress has reduced the cost of manufacturing mp3 players. what happens if demand is unchanged?
    9·1 answer
  • Implement function translate() that provides a rudimentary translation service. The function input is a dictionary mapping words
    9·1 answer
  • You are using a new release of an application software package. You think that you have discovered a bug. Outline the approach t
    14·1 answer
  • HELP PLEASE ASAP!!! Does anyone know how to fix a broken iPhone which when I connect it to the charger it comes up with the Appl
    5·1 answer
  • What are the common uses of joysticks? ​
    12·1 answer
  • How to hide location on iphone without them knowing?.
    5·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
  • Cidr simplifies how routers and other network devices need to think about the parts of an ip address, but it also allows for mor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!