1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
6

Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma

nipulating images on the computers screen. GUI is pronounced gooey true or false
Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
8 0
The answer to that is true. There are other ways of saying it tho like to-mae-to or to-mat-o
You might be interested in
What are the basic data types supported in C programing language?
Murljashka [212]

Answer:

The C language provides the four basic arithmetic type specifiers char, int, float and double, and the modifiers signed, unsigned, short, and long.

6 0
3 years ago
Find the quotient and the remainder of 11010111 ÷ 1010, assuming that the binary numbers are signed integers in two's complement
andrew-mc [135]

Answer:

Answered

Explanation:

(11010111)_2= -32+8+2+1 = -21

value of 21 = (010101)_2

(100111)_2= -32+4+2+1= -24

value of 25 = (011001)_2

-21\times -25 = 525

525 = (001000001101)_2

5 0
3 years ago
What was the original intention for the creation of ARPANET?
Anika [276]

ARPANET was the network that became the 'basis' for the Internet. It was based on a concept first published in 1967. It was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four university computers.

3 0
3 years ago
Read 2 more answers
If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same p
andrew11 [14]
<span>If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it.  This is this known as </span>processor affinity. 
4 0
3 years ago
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which statements describe molecules
    12·1 answer
  • Which of the following is true about REST?
    12·1 answer
  • BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
    6·2 answers
  • What should you rely on to determine when to change your oil? a. Oil color b. 6,000 miles since the last oil change c. Owners ma
    7·1 answer
  • What is a computer dedicated to a single function, such as a calculator or computer game? A. TabletB. PDAC.ApplianceD. Minicompu
    6·1 answer
  • Which of the following lines of code is syntactically correct?
    14·1 answer
  • For the function definition int SomeFunc( /* in */ int alpha, /* in */ int beta ) { int gamma; alpha = alpha + beta; gamma = 2 *
    6·2 answers
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • Many phone fraud scammers are expessily cunning because they approach the target to try to sell
    9·1 answer
  • put together a shopping list of items that a first responder should always have at immediate disposal in a field kit. Using curr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!