1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
10

When you write a program that will run in a GUI environment as opposed to a

Computers and Technology
1 answer:
givi [52]3 years ago
8 0

When you write a program that will run in a GUI environment as opposed to a

command-line environment, some syntax is different.

Explanation:

  • GUI (Graphical User Interface) which is the computer user interface uses graphical images to activate and run the applications.
  • Command line interface is a interface that is in a text format, which can accept commands for a task.
  • So, to program both interface, we need high level program skills with good understanding in programming languages like C++, C etc and algorithms.
  • Here, the GUI syntax differs from the command line interface.
You might be interested in
Do earthquakes ever happen in Malaysia?​
adoni [48]

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

Do earthquakes ever happen in Malaysia?

Yes, they do. And they are very frequent and high in intensity.

For instance, the Sabah earthquake in 2015.

On June 5, 2015, the region of Malaysia was hit by a strong earthquake, 6.0 of magnitude on the Ritcher scale. The telluric movement lasted 30 seconds and caused much destruction.

Experts and scientists confirm that this had been the strongest earthquake since the one presented in 1976.

8 0
3 years ago
How do i find the greatest common factor of two numbers?
Lilit [14]
You can list the numbers . keep listing them till you find the same numbers
8 0
2 years ago
In the NumPy function, the data preparation technique that is used to help machine learning algorithms is called _________.
KonstantinChe [14]

In the NumPy function, the data preparation technique that is used to help machine learning algorithms is called the reshape technique or function

For better understanding, let us explain what the reshape function means

  • The numpy package helps to give the right tools for scientific and mathematical computations in python . it includes functions that cam be used to perform common linear algebra operations, fast Fourier transforms, and statistics The reshape function simply alter or change the row and column arrangement of data in numpy function and it is said to just give new shape to an array without the altering of its data.

from the above, we can therefore say that the answer In the NumPy function, the data preparation technique that is used to help machine learning algorithms is called the reshape technique or function is correct

learn more about reshape function  from:

brainly.com/question/24728884

3 0
2 years ago
A news website uses 32-bit integers to count the number of times an article has been viewed. The website is becoming more popula
Irina-Kira [14]

Answer:

2^32 times as many values can be represented

Explanation:

32-bit. This means that the number is represented by 32 separate one’s and zero’s. 32 bits of 2 possible states = 2^32=4,294,967,296 possible values.

Integer meaning that only whole multiples of one are accepted.

Signed meaning that negative values are accepted. This halves the number of possible positive values (roughly), so the largest number you can represent is 2^31–1=2,147,483,647, but instead of 0, the smallest number you can represent is -2,147,483,648. An unsigned 32-bit integer, by contrast, can represent anything from 0 to 4,294,967,295.

7 0
2 years ago
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
Inessa [10]

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

3 0
3 years ago
Other questions:
  • Design a module named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prom
    6·1 answer
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • Jason Has A Science Video Project, As He Creats His Project, He Saves, Then Comes Back A Minute Later. The File Is Now Unreadabl
    8·2 answers
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • Please explain this code line by line and how the values of each variable changes as you go down the code.
    8·1 answer
  • In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
    14·1 answer
  • Write its features:features of computer ​
    15·1 answer
  • What is an automatic update and when should you use it
    10·1 answer
  • When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is mos
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!