1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
9

A provides an easy way for workers to interact with their computers

Computers and Technology
1 answer:
LenKa [72]3 years ago
7 0

<u>Answer:</u>

<em>GUI provides simple and easy way to operate computers. </em>

<u>Explanation:</u>

Before <em>GUI there were only CUI (Character User Interface) where the user needs to remember lots of commands to interact with computer </em>and it is also time consuming.

<em>Eg. DOS (Disk Based Operating System). </em>

This problem was overcome by GUI where it contains buttons where the user can use the <em>mouse to click, double click or right click </em>according to the options provided by the environment. <em>GUI is the successor of CUI.</em>

You might be interested in
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
4 years ago
100 points, PLEASE HELP...To generate numbers between and including -10 to 10 you would use:
Orlov [11]

Answer:

A number line?

6 0
3 years ago
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
kari74 [83]

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

<h3>What Is an Application Attack?</h3>

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

brainly.com/question/25633298

3 0
2 years ago
The use of logistics software at DCS (7 points)
Charra [1.4K]

Answer:18 th Century

Explanation:

3 0
3 years ago
Other questions:
  • 1. The future of 2D animation does not include hand-drawing. (1 point)
    13·1 answer
  • What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
    6·2 answers
  • Nina aspires to be a digital media specialist. What should Nana be familiar with in order to pursue this career?
    9·2 answers
  • William found out that someone used his report on American culture without his permission. What is William a victim of? A. plagi
    7·2 answers
  • Suppose there are two links between a source and a destination. The first link has transmission rate 100 Mbps and the second lin
    12·1 answer
  • Anyone understand coding? Please Help! Thank you! :)
    8·1 answer
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • O Why was the Internet originally constructed? Oto enable researchers to communicate
    6·2 answers
  • Answer for 5,6,7 any one know plz
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!