Answer:
1. DLL Files.
2. System software repair.
3. Software configuration.
4. Human-computer interaction.
5. A graphical user interface (GUI).
Explanation:
1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.
2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.
3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.
4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.
5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.
Answer:
A. A1
Explanation:
Worksheet's Columns are named with Alphabets. i.e. A,B,C,D,E....
And Worksheet's rows are named with numbers. i.e. 1,2,3,4,5....
So the intersection of first row number as "1" and First Column name as "A" is A1 as worksheet displays column name first and then row number.
Answer:
A
Explanation:
I think is A. or maybe search up the topic of the lesson
Answer:
See there are multiple ways to get a perfect shot of products to stand out but the most affective according to me are explained below :-
- Macro shooting - These are close shots u can say really close just to show the product more attractive and u can see these types of shots in every advertisement.
- Background shooting/shots - Opposite of macro shots.
- 3d shots - These are 360° shots.
Tip :- Use wide aperture like F2 and right aperture for right shots.
Hope it helps!
Answer:
b) White-hat hacker
Explanation:
This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out based on a agreement between the whihte-hat hacker and the client via a contract.