1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
12

In what year were graphical user interfaces (GUIs) pioneered? 1969 1974 1991 2001

Computers and Technology
2 answers:
natima [27]3 years ago
7 0
Graphical user interface [GUIs] was pioneered in 1969.
Graphical user interface refers to the use of pointing devices and graphic icons to control a computer. It allows users to interact with the computer hardware 
The development and the refinement of graphical user interface had be ongoing for about fifty years. In the late 1960s, Stanford Research Institute scientists developed the online system, which used a new device called mouse. 
Flura [38]3 years ago
7 0

Answer:

The correct option for the following question will be 1969.

Explanation:

GUI stands for Graphical User Interface, developed by Douglas Engelbart Alan Kay at Xerox PARC and was pioneered in 1969. The type of actions that can be taken by the user represented by the graphical user interface and it interacts with the user when the objects changes color, size or visibility.

The objects like button, cursor and icons included in the GUI, these elements can be enhanced with visual effects or sound. The GUI considered as more user-friendly than MS-DOS (text based) and the UNIX shell (operating system).

You might be interested in
The ________ contains the central electronic components of the computer. select one:
Sati [7]
The motherboard contains the central electronic components of the computer.
6 0
3 years ago
Smartart and shapes are useful tools because they allow you to
charle [14.2K]
Organize data within a document..draw any shape you wants within a document... easily create manipulate shapes within a document. hope this helps
4 0
3 years ago
18. Applying what formatting option to your Excel workbook will make it easier to read when printed out?
Sergeu [11.5K]
Depending on the data all answers can be used to make it easier to read. Without more info I would go with Borders (D) since they are the best way to group the data when printed, especially if the print is in color.

Alignment would be the correct answer only if the data goes out of cell boundaries. Font Color usually makes it harder to read because of bad contrast and finally changing the Font Style has a minimal effect since the default one is already pretty readable.
7 0
3 years ago
Why is John Von Neumann to a remarkable name?<br>si​
Black_prince [1.1K]

Answer:

John von Neumann is remarkable for his vast knowledge of mathematics, and the sciences as well as his ability to correlate the pure and applied sciences.

Explanation:

John von Neumann who was born on December 28 1903, and died on February 8,1957 was known for his extensive knowledge of mathematics, physics, computer, economics, and statistics. In computing, he was known to conceive the idea of the self-replicating machines that thrive in the automata cellular environment, the von Neumann architecture, stochastic computing and linear programming.

He developed the game theory in Economics, and laid the foundation for several mathematical theories. He contributed greatly to quantum mechanics and quantum physics. Little wonder, he was dubbed "the last representative of the great mathematicians."

8 0
3 years ago
You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules a
Anna35 [415]

Answer:

Social Engineering

Explanation:

Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.

4 0
3 years ago
Other questions:
  • ____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, man
    11·2 answers
  • list six external parts or peripherals of a computer system and identify which are output and which are input devices
    8·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • Which stage of the waterfall model is most like the simple model's stage 5?
    12·1 answer
  • Name all mario kart games in order
    15·2 answers
  • The data-mining technique that creates a report or visual representation is _____.
    13·1 answer
  • Apps are designed by___.
    11·2 answers
  • Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
    6·1 answer
  • How was WiFi discovered?
    8·1 answer
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!