1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
12

Discuss the different types of user-friendly interfaces and the types of users who typically use each.

Computers and Technology
1 answer:
Juliette [100K]3 years ago
5 0

Answer:

1. Natural Language Interface- Telephone users

2. Menu Driven Interface- Automated Teller machine users.

3. Graphic User Interface- Computer users

4. Form-based interface- Website visitors

5. Command-line interface- Advanced users of computers

Explanation:

User interface refers to the hardware and software features in a computer system which makes it easier for the operators to relate with the system. Some of them include;

1. Natural Language Interface- This software feature allows the user to send oral instructions to the computer system.  Telephone users experience this when they give oral commands to their phones.

2. Menu Driven Interface- Contains buttons and a touch screen feature that allows users to enter commands in a menu. Automated teller machines used by bank customers are menu-driven interfaces.

3. Graphic User Interphase- Involves the use of the cursor to draw images using graphic icons. Graphic designers can use this to create images.

4. Form-based Interface- Basically contains fields with boxes and menus that would need to be completed. For example, job seekers have to complete fields and boxes before they submit a job application form online.

5. Command-line interface- Is characterized by basic commands which are to be entered by the user to the computer. Advanced users of computes use this feature.

You might be interested in
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
2 years ago
Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.
Lyrx [107]

Answer:

=IF(D3>50; E3; F3) AND =IF(A1>60;"Pass";"Fail")

Explanation:

An IF structure is built following this pattern:

IF(TEST;IFTRUE;IFFALSE)

These are the only options in the given drop-down menus what comply with this pattern.  All others are not following this pattern.

The computer will do the test and if the result is true will apply the IFTRUE value, otherwise will apply the IFFALSE value.

4 0
3 years ago
Is a NAS just a collection of hard drives or a computer
skelet666 [1.2K]

Answer:

NAS systems are networked appliances that contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.

8 0
3 years ago
What type of lens was used to take this picture?
Leona [35]

Fish-eye because this is how you would see through a "fish eye" point of view in a rounded tank that is commonly used.

May I please have brainliest

4 0
3 years ago
Which one of the following media is unguided media ?​
krok68 [10]

Explanation:

1. radio transmission.

2. microwave transmission

3. infrared transmission.

4 0
2 years ago
Other questions:
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    11·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Insert a row above the selected row (in between row 1 and row 2).
    15·2 answers
  • What are expansion cards used for?​
    9·2 answers
  • En que se diferencia el software y el hardware
    7·2 answers
  • Why when I move stuff in Roblox Studio like an object or a Character. It tilts the opposite direction I'm moving it to with the
    6·2 answers
  • When comparing different biometric systems, one of the most important metrics used is called the _________, which represents the
    14·1 answer
  • Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
    9·1 answer
  • What is this?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!