1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
6

Pictures that you can click on to tell your computer what to do

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
3 0
What are you asking???????????????????????????????????????????
You might be interested in
Henry wants to use handheld computers to take customers' orders in her restaurant. He is thinking of using custom written, open
DochEvi [55]

Answer: See explanation

Explanation:

Custom written software refers to the software that's developed for some particular organization or users. It's crates in order to meet the unique requirements of a business.

Since Henry is thinking of using custom written, open source software, then a custom written software will be used. Examples of custom written software will be automated invoicing, bug tracking software, E-commerce software solutions etc.

7 0
2 years ago
Write a python computer program that prints out a factorial.
galina1969 [7]

I included my code in the picture below.

6 0
3 years ago
A linear representation of a hierarchical file directory is known as what?
MissTica
It is known as a directory path
5 0
3 years ago
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
Hunter-Best [27]

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

6 0
3 years ago
If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
Luden [163]
A high deductible plan if that person blames you for it and said that it was on purpose
5 0
3 years ago
Other questions:
  • Match the tool to its description.
    15·1 answer
  • AirPods se están despintando al ponerlos en quitaesmalte ayudaaaa?
    6·1 answer
  • HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol inclu
    12·1 answer
  • Which website domains are most credible?
    6·2 answers
  • It is important to use as much text as possible in a presentation. <br> a. True<br> b. False
    9·1 answer
  • Zach would like to reuse a spreadsheet that he created last year. However, he will need to delete the contents of several cells.
    5·1 answer
  • Discuss All control statements supported by Go
    13·1 answer
  • Implement A* graph search. A* takes a heuristic function as an argument. Heuristics
    5·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
  • 2. Create 4 riddleson keywords which is related to fire wall.​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!