1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
4 years ago
6

What areare iconsused for?​

Computers and Technology
2 answers:
Tom [10]4 years ago
7 0

Answer:

Icons guide/helps users where they need to go . For example, If I want to go to app safari, there is an icon that I am familiar with and I will go and click on the icon.

Explanation:

An icon represents a program on your hard drive. It is a design pattern for an app. Icons attracts the user depending on how good it looks.

Marat540 [252]4 years ago
4 0
Icons are effective when they improve visual interest & grab the user's attention. They help guide users while they're navigating a page. If you use too many icons then they'll become a decoration
You might be interested in
How many slides are present in a blank presentation
Kobotan [32]
One, right? Because there's just the blank title slide that automatically pops up. 
8 0
3 years ago
Read 2 more answers
Please explain external hashing, B-trees, and traversals. 3-5 sentences per
katrin [286]

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

4 0
4 years ago
*Sometimes it is difficult to convince top management to commit funds to develop and implement a SIS why*
ziro4ka [17]

Step-by-step Explanation:

SIS stands for: The Student Information System (SIS).

This system (a secure, web-based accessible by students, parents and staff) supports all aspects of a student’s educational experience, and other information. Examples are academic programs, test grades, health information, scheduling, etc.

It is difficult to convince top management to commit funds to develop and implement SIS, this can be due to a thousand reasons.

The obvious is that the management don't see the need for it. They would rather have students go through the educational process the same way they did. Perhaps, they just don't trust the whole process, they feel more in-charge while using a manual process.

4 0
3 years ago
Im being timed please help!!
astra-53 [7]

Answer:

ALL

Explanation:

Because if it was a test you can ask a teacher, if it was group projects you can ask the study group, if it was homework or 1 on 1  you can ask a tutor

7 0
4 years ago
Read 2 more answers
Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the g
lara [203]

Answer:

double ComputeGasVolume(double pressure, double temperature, double moles){

   double volume = moles*GAS_CONST*temperature/pressure;

    return volume;        

}

Explanation:

You may insert this function just before your main function.

Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles

Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.

6 0
3 years ago
Other questions:
  • A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by
    14·1 answer
  • You can use the Ignore All button to ignore the current and all future occurrences of a flagged word. True or False
    5·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • We have the following class:
    6·1 answer
  • Alcohol first impairs your ____?
    12·2 answers
  • How do you change the color on the text in the email​
    6·1 answer
  • ____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to h
    5·1 answer
  • Which statement describes a biotic factor interacting with the environment?
    5·1 answer
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • Peter has recently bought a media player and a digital camera. He wants to buy a memory card for these devices. Which memory dev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!