<h2>
Answer:</h2>
Following are the vocabulary words matched to their definitions:
1. Command:
Instructions that tell a computer what to do.
Pressing a single button such enter key can also be said as command. So command is any instruction that tells a computer to perform specific action.
2. Desktop
The background screen on a computer.
When the computer is turned ON, the screen we see the first is the Desktop. It has several icons that lead to different folders and files.
3. GUI
Rectangular area on a computer screen where the action takes place performing more than one activity at a time.
GUI stands for Graphical User Interface. It is an interface that allows to create application that may run using icons and labels instead of text commands
4. Menu
List of commands.
A menu is a drop down list that allows us to choose a command from the present ones. Menus are used vastly. For example: Simply a right clicking on computer's screen we see a menu having commands for arranging of icons as well as refreshing.
5. Multitasking
Interface that enables users to easily interact with their computers.
Multitasking allows the users to perform more than one task at a time. Multitasking helps to save time.
6. Window
The main work area.
The opened pane o any program is termed as a window. work is done inside the window of the program.
<h2>I hope it will help you!</h2>
Answer:
Is there an early pay discount?
Explanation:
This determines and instructs what path the code should take,
if there is no early pay discount, it has different instructions to follow.
Answer:
1.T 2.f 3.t 4.f 5.f 6.f 7.t 8.t 9.f
To delete only the selected contents of the table, but not the table itself, you need to click on this cell in the table.
Answer:
The correct answer to the following question is Drive-by hacking
.
Explanation:
Drive-by hacking is the type of hacking which comes under the cyberterrorism.
Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.
Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.