1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
2 years ago
15

When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing

Computers and Technology
1 answer:
xxMikexx [17]2 years ago
5 0
<span>D - graphical user interface</span>
You might be interested in
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
The term "resolution" refers to ______.
Usimov [2.4K]

Options A and C can get you confused. We can choose option A if our argument is based entirely on digital images. The correct answer, however, is  C: Number of pixels you see on your computer monitor.

Resolution describes the clarity and sharpness of a picture that can be measured by the number of pixels contained on a display monitor. It can be expressed by the number of horizontal (width) and vertical pixels (height) represented by a screen. The clarity and sharpness are always dependent on the resolution and size of the monitor.

4 0
3 years ago
Read 2 more answers
_________ local variables retain their value between function calls.
SOVA2 [1]

Answer: static

Explanation:

variables when declared static gets called statically meaning whenever a function call is made it get stored and it is not required to get the variable again when the function is again called. There scope is beyond the function block

4 0
2 years ago
HELPPP ME PLEASEEE!!
natita [175]
It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.
4 0
2 years ago
Anthony is deciding between different savings accounts at his bank. He has four options, based on how frequently interest compou
leonid [27]
Depends is the answer multiple choice
7 0
3 years ago
Read 2 more answers
Other questions:
  • True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other d
    13·1 answer
  • A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa
    11·1 answer
  • Launched in 1995, ________ has become the most popular web browser.
    6·1 answer
  • How does information technology most benefit people’s personal and professional lives?
    9·2 answers
  • A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
    10·1 answer
  • Which different supports from a part of the matte box?
    8·1 answer
  • The location on the Word screen where text will be entered is known as the _____.
    14·1 answer
  • Why is e-mail better for informative and positive messages than for negative ones?
    6·1 answer
  • What is a slide master ?
    8·2 answers
  • Where can elicitation techniques be used?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!