1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
3 years ago
15

What is the use of "Computer" Icon ?

Computers and Technology
2 answers:
snow_lady [41]3 years ago
7 0




Hi pupil Here's your answer :::




➡➡➡➡➡➡➡➡➡➡➡➡➡



The Computer Icons can provide access to the resources on your computer. You can access your storage drives and by double clicking on the Computer icon.

It usually used in a Graphical User Interface systems.



⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps
Artyom0805 [142]3 years ago
6 0

From there you can go into any app or program.

You might be interested in
Which criterion can be used to select the appropriate type of network media for a network?
OverLord2011 [107]

There are various kinds of network media and each one of them has different features and benefits. Some have different characteristics and not all of them are meant to perform the same purpose. While choosing network media, a number of criteria must be met. These criteria include:

The distance the selected medium can successfully carry a signal.

The environment where the selected medium is to be installed

Explanation:

The distance the selected medium can successfully carry a signal – The type of network media you choose depends on the distance it can cover before you install signal boosters or repeaters. Repeaters are used to regenerate signals that are required to cover greater distances. A UTP cable as compared to fiber is more prone to interference like noise and the distance it covers before a signal repeater is installed is shorter. Fiber cable is considered the best for distances as it can cover longer distances.

Environment should also be considered when choosing network media - If your network is setup in a place where there is too much electromagnetic field being generated, then you may be required to purchase fiber optic cables. Fiber optics are immune to such interference.

Learn about network media

brainly.com/question/9279069

#LearnWithBrainly

3 0
3 years ago
Use list indexing to print the last element of the list literal value.
AnnZ [28]

Answer:

print(["Not me", "Nor me", "Print me!"][2])

Explanation:

Given

print(["Not me", "Nor me", "Print me!"])

Required

Print last element of the list literal value

The implication of this question is to print "Print me!"

We start by analysing the given list.

The given list has 3 elements

But because indexing of a list starts from 0, the index of the last element will be 3 - 1 = 2

So, to print the last element, we simply direct the print statement to the last index.

This is done as follows

print(["Not me", "Nor me", "Print me!"][2])

The [2] shows that only the literal at the last index will be printed.

This means that the string "Print me!" will be printed.

The code can also be rewritten as follows

mylist = ["Not me", "Nor me", "Print me!"]

print(mylist[2])

Here, the first line stores the list in a variable.

The second line prints the last element of the list literal value which is "Print me!"

4 0
2 years ago
Slide transition can be defined as ____ of one slide after another​
UkoKoshka [18]

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

6 0
3 years ago
Compare and contrast assertiveness, arrogance and passivity.
bekas [8.4K]

Assertiveness is self-confidence that does not infringe on the feelings of others. Assertiveness allows a person to state their needs and assert their ideas. Arrogance, on the other hand, is highly confrontational. An arrogant individual insists on their viewpoint or idea because it is theirs, rather than the best possibility. A passive person, on the other hand, is unwilling to assert their needs and wants. They often put themselves in difficult positions because they are unwilling to refuse requests and demands on their time based on the idea of avoiding confrontation.

3 0
3 years ago
What is bugtraq?
beks73 [17]

Answer:

The answer would be (C) An industry mailing list provided by Symantec that reports new vulnerabilities as they are discovered.

I hope this helped!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Of the 3 primary electrical entites (voltage, current, and resistance )which is the result of the other two
    15·1 answer
  • Select the correct answer.
    14·1 answer
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • Write a class called Course that represents a course taken at a school. Represent each student using the modified Student class
    6·1 answer
  • The following sentence has a mistake.
    13·1 answer
  • What refers to a pleasing arrangement of colors that creates a sense of balance or equilibrium in an image? _____ refers to a pl
    15·2 answers
  • What are the benefits of writing functions that use parameters and return? Try to list at least two.
    12·1 answer
  • Most IT security threats originate with hackers.<br> Question 3 options:<br> True<br> False
    9·1 answer
  • Why do software managers have to be generalists with a range of skills, rather than simply technical specialists?
    14·1 answer
  • Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!