1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
2 years ago
11

Match each vocabulary word to its definition.

Computers and Technology
2 answers:
Anvisha [2.4K]2 years ago
7 0

Answer:

Following are the vocabulary words matched to their definitions:

1. Command:

Instructions that tell a computer  what to do.

Pressing a single button such enter key can also be said as command. So command is any instruction that tells a computer to perform specific action.

2. Desktop

The background screen on a computer.

When the computer is turned ON, the screen we see the first is the Desktop. It has several icons that lead to different folders and files.

3. GUI

Rectangular area on a computer screen where the action takes place performing more than one activity at a time.

GUI stands for Graphical User Interface. It is an interface that allows to create application that may run using icons and labels instead of text commands

4. Menu

List of commands.

A menu is a drop down list that allows us to choose a command from the present ones. Menus are used vastly. For example: Simply a right clicking on computer's screen we see a menu having commands for arranging of icons as well as refreshing.

5. Multitasking

Interface that enables users to easily interact with their computers.

Multitasking allows the users to perform more than one task at a time. Multitasking helps to save time.

6. Window

The main work area.

The opened pane o any program is termed as a window. work is done inside the window of the program.

Explanation:

grandmama

ycow [4]2 years ago
4 0
<h2>Answer:</h2>

Following are the vocabulary words matched to their definitions:

1. Command:

Instructions that tell a computer  what to do.

Pressing a single button such enter key can also be said as command. So command is any instruction that tells a computer to perform specific action.

2. Desktop

The background screen on a computer.

When the computer is turned ON, the screen we see the first is the Desktop. It has several icons that lead to different folders and files.

3. GUI

Rectangular area on a computer screen where the action takes place performing more than one activity at a time.

GUI stands for Graphical User Interface. It is an interface that allows to create application that may run using icons and labels instead of text commands

4. Menu

List of commands.

A menu is a drop down list that allows us to choose a command from the present ones. Menus are used vastly. For example: Simply a right clicking on computer's screen we see a menu having commands for arranging of icons as well as refreshing.

5. Multitasking

Interface that enables users to easily interact with their computers.

Multitasking allows the users to perform more than one task at a time. Multitasking helps to save time.

6. Window

The main work area.

The opened pane o any program is termed as a window. work is done inside the window of the program.

<h2>I hope it will help you!</h2>
You might be interested in
How r u<br> ;)<br> happy what day is it
Ivahew [28]

Answer:

o

dw

Explanation:

5 0
2 years ago
Read 2 more answers
The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
DIA [1.3K]

The concepts of Power, anonymity and political utility for covert acts are pivotal to understanding state-on-state interactions within cyberspace.

<h3>What is Anonymity?</h3>
  • Anonymity describes cases where the interim person's identity is anonymous.
  • Some writers have argued that anonymity, though technically accurate, does not capture what is more centrally at stake in contexts of anonymity.
  • The essential concept here is that an individual is non-identifiable, unavailable, or untrackable.
  • Anonymity is seen as a technique, or a way of realizing, sure other values, such as solitude, or liberty.
  • Over the past few years, anonymity tools used on the dark web by offenders and harmful users have drastically changed the ability of law enforcement to use conventional surveillance Techni.

To learn more about Anonymity, refer to:

brainly.com/question/28115737

#SPJ4

3 0
1 year ago
Where is the spell checker found in excel?
fenix001 [56]
Except keyboard of F7 and Spell Checkbutton in toolbar, you are also able to apply Spelling check command fromExcel 2007/2010/2013/2016 Ribbon: Click the Review tab; Go to Proofing group; Then you will view the Spellingbutton , that's Spell Check command.



hope this helps
5 0
3 years ago
Read 2 more answers
20 points!!
creativ13 [48]
I think it’s C considering what clip art is, you put in pictures. i’m crying with you
3 0
2 years ago
Windows server 2012 r2 supports two types of folder shares. what are those two types?
larisa [96]
<span>Windows server 2012 r2 supports the following two types of folder shares: </span>Network File System and Server Message Blocks. Correct answer: D
Network File System<span> (</span>NFS) is a distributed file system protocol for <span>storing and updating files on a remote computer. </span>
The Server Message Block<span> (SMB) Protocol is a </span>network file sharing protocol.
7 0
3 years ago
Other questions:
  • What is the last step in planning your budget
    11·1 answer
  • Computer a sends a packet intended to reach computer f. along its path it arrives at computer
    15·1 answer
  • Online library catalogs can direct you to your closest library. (1 point)<br> True<br> False
    8·1 answer
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    5·2 answers
  • Your task is to write and test a function which takes one argument (a year) and returns True if the year is a leap year, or Fals
    5·1 answer
  • The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
    15·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • Which command tells the for loop what to count by?
    9·2 answers
  • What are the main dimensions of information system and their components
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!