1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
11

Match each vocabulary word to its definition.

Computers and Technology
2 answers:
Anvisha [2.4K]3 years ago
7 0

Answer:

Following are the vocabulary words matched to their definitions:

1. Command:

Instructions that tell a computer  what to do.

Pressing a single button such enter key can also be said as command. So command is any instruction that tells a computer to perform specific action.

2. Desktop

The background screen on a computer.

When the computer is turned ON, the screen we see the first is the Desktop. It has several icons that lead to different folders and files.

3. GUI

Rectangular area on a computer screen where the action takes place performing more than one activity at a time.

GUI stands for Graphical User Interface. It is an interface that allows to create application that may run using icons and labels instead of text commands

4. Menu

List of commands.

A menu is a drop down list that allows us to choose a command from the present ones. Menus are used vastly. For example: Simply a right clicking on computer's screen we see a menu having commands for arranging of icons as well as refreshing.

5. Multitasking

Interface that enables users to easily interact with their computers.

Multitasking allows the users to perform more than one task at a time. Multitasking helps to save time.

6. Window

The main work area.

The opened pane o any program is termed as a window. work is done inside the window of the program.

Explanation:

grandmama

ycow [4]3 years ago
4 0
<h2>Answer:</h2>

Following are the vocabulary words matched to their definitions:

1. Command:

Instructions that tell a computer  what to do.

Pressing a single button such enter key can also be said as command. So command is any instruction that tells a computer to perform specific action.

2. Desktop

The background screen on a computer.

When the computer is turned ON, the screen we see the first is the Desktop. It has several icons that lead to different folders and files.

3. GUI

Rectangular area on a computer screen where the action takes place performing more than one activity at a time.

GUI stands for Graphical User Interface. It is an interface that allows to create application that may run using icons and labels instead of text commands

4. Menu

List of commands.

A menu is a drop down list that allows us to choose a command from the present ones. Menus are used vastly. For example: Simply a right clicking on computer's screen we see a menu having commands for arranging of icons as well as refreshing.

5. Multitasking

Interface that enables users to easily interact with their computers.

Multitasking allows the users to perform more than one task at a time. Multitasking helps to save time.

6. Window

The main work area.

The opened pane o any program is termed as a window. work is done inside the window of the program.

<h2>I hope it will help you!</h2>
You might be interested in
Where is 5G being used and how fast is it?​
soldi70 [24.7K]

Answer:

5G is being used currently in the U.S. It is definetly faster than 4G even proven when I did a speed test. It also works in more places in addition to being faster.

Explanation:

5 0
3 years ago
Read 2 more answers
Please help me to do this task
natima [27]

INPUT Num

While Counter > 12

       Num Num * Counter

       A[Counter] Num

End While

5 0
4 years ago
In the secure development lifecycle, how must the specific security needs of software being developed be defined?- Coding phase
Karo-lina-s [1.5K]

Answer: Requirements phase

Explanation:Requirement phase in the SDL(secure development life-cycle) is the phase where the security is fused with integrity part for any product. This mechanism is done to know about the requirement of the product in the security field. This is done to achieve the completeness in the product and to recover the mistakes that had happened earlier in the product due to security issues.

Other phase given in the option are for making the code, designing the model of product and testing the products aspects respectively.

4 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
What are the parts to an
bazaltina [42]

Answer:

B) recipient subject body signature

5 0
3 years ago
Other questions:
  • Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
    11·1 answer
  • Why is fluency in information technology becoming increasingly important for many college majors?
    10·2 answers
  • Assume that we are using 0-1 integer programming model to solve a capital budgeting problem and xj = 1 if project j is selected
    6·2 answers
  • Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
    15·1 answer
  • If Chris has a car liability insurance, what damage would he be covered for
    10·1 answer
  • 1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative va
    11·1 answer
  • What does the following code print to the console?<br> if 88 * 100:<br> print("cardio")
    8·1 answer
  • 100 POINTS!!!!
    10·1 answer
  • How to give answer like this?????
    14·1 answer
  • A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. th
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!