1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
6

The means by which an operating system or any other program interacts with the user is called th

Computers and Technology
1 answer:
natulia [17]3 years ago
7 0
Networking capabilities of a computer
You might be interested in
What is an example of the most important role of a systems analyst in any corporation?
dsp73

Answer: The system analyst is one of the most important members in any organisation. These system analyst has to analyse different data of the organisation which would help to bring out the different any new business policy changes or any kind of improvement.

Explanation:

An example to know this better would be the system analyst of a telecom company. Here the role of the system analyst would be bring out the design and implementation of new telecom information system and also should be aware of previous data of the organization. The system analyst would also be responsible to bring out the new business policies based on latest telecom standards and ensure the systems conforms to the latest standards.

5 0
3 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Engine coolant does all of the following except
Amiraneli [1.4K]
D prevent the formation of rust
8 0
3 years ago
Read 2 more answers
A burglar alarm company's advertisements show images of women's homes being broken into. What stereotype is promoted by these ad
Lady_Fox [76]
C. that women are vulnerable
5 0
3 years ago
Read 2 more answers
Please help me with computing!
Sladkaya [172]

Answer:

ok i help

Explanation:

3 0
3 years ago
Other questions:
  • Emma wants to create a web page for her school’s volleyball team. Which of these could she use?
    7·1 answer
  • Sarah's research shows that business information management professionals also perform the duties of other professionals. Which
    9·1 answer
  • In a Comparative Government course, the first unit focuses on the US Congress and the
    8·1 answer
  • Read the following scenario, and then answer the question below.
    15·2 answers
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • -The following type of Access form allows to see multiple records in an Excel-like arrangement of data fields:
    14·1 answer
  • Why is the lack of a sense of humor a serious limitation for AI?
    6·1 answer
  • Using the spreadsheet below, which formula can be used to determine Albert's hourly wage?
    6·2 answers
  • An end-user license agreement protects _____.
    7·1 answer
  • Icon view, list view, and details view are all common views provided by which kind of program?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!