1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
15

When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing

Computers and Technology
1 answer:
galben [10]3 years ago
5 0
The Correct answer is B.graphical user interface.
You might be interested in
Where deep convolutional neural network is used in real life
MrMuchimi

Answer:

Business applications of Convolutional Neural Networks. Image Classification - Search Engines, Recommender Systems, Social Media. Face Recognition Applications of RNN is Social Media, Identification procedures, Surveillance. Legal, Banking, Insurance, Document digitization - Optical Character Recognition.

4 0
2 years ago
Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
NeX [460]
They're not dangerous. However, they do cause mild tremors.
3 0
3 years ago
Write a function named "json_filter" that takes a JSON formatted string as a parameter in the format of an array of objects wher
7nadin3 [17]

Answer:

Check the explanation

Explanation:

kindly check the well written code below to get the solution to your question.

import json

def json_filter(input_string):

   jsonFormat = json.loads(input_string)

   result = []

   for obj in jsonFormat:

       if obj["temperature"] > 38.46:

           result.append(obj)

   return json.dumps(result)

7 0
3 years ago
Which of the following are associated with Public Key encryption? (Select all that apply.) Question 2 options: a) Asymmetric key
tatiyna

Answer:

A- ASYMMETRIC KEYS

Explanation:

Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.

Asymmetric keys allows someone to send their public key in an open and insecure channel.

3 0
3 years ago
Name 3 examples of operating system software that are not Windows based.
anyanavicka [17]
Ubuntu, Linux, and Mint
4 0
3 years ago
Other questions:
  • Variable names may contain spaces and punctuation symbols. True False
    15·1 answer
  • Which of the following is NOT part of the Ethernet standards? O 1.802.3 O 2.802.2 O 3 LLC O4 pPp
    12·1 answer
  • Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploa
    12·2 answers
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • It is impossible to overemphasize the fact that, from the perspective of a computer, a network is a) simply another I/O device.
    9·1 answer
  • Why does a bus topology require a terminator? a) because otherwise it would be a ring network b) because otherwise the packets w
    10·2 answers
  • Anybody want to help me figure out how to put this on a resumè
    12·1 answer
  • What is the introduction of an algorithm and programming and how does it work?
    11·1 answer
  • Which sql keyword is used to retrieve a minimum value from an attribute in a table
    7·2 answers
  • A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!