1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
5

Explain gui in detail​

Computers and Technology
1 answer:
valina [46]3 years ago
7 0

Answer:

Stands for "Graphical User Interface" and is pronounced "gooey." It is a user interface that includes graphical elements, such as windows, icons and buttons. The term was created in the 1970s to distinguish graphical interfaces from text-based ones, such as command line interfaces.

Explanation:

The graphical user interface is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces, typed command labels or text navigation. A GUI allows the user of a computer to communicate with the computer by moving a pointer around on a screen and clicking a button. ... A program on the computer is constantly checking for the location of the pointer on the screen, any movement of the mouse, and any buttons pressed.A GUI uses windows, icons, and menus to carry out commands, such as opening, deleting, and moving files. Although a GUI operating system is primarily navigated using a mouse, a keyboard can also be used via keyboard shortcuts or the arrow keys.

You might be interested in
Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output i
trapecia [35]

Answer:

num1=2

num2=3

num3=5

num1= int(num1)

num2= int(num2)

num3= int(num3)

pro = num1*num2*num3

print(pro)

Explanation:

This is very close to a correct answer in easy code and easy to read, I was not able to put the answer in without the proper indentation alignment the way I would present this. So please adjust to your requirements for the indentation.

3 0
2 years ago
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing the
zvonat [6]

Answer:

wireless LAN

Explanation:

An extranet is a network area where people or corporate partners external to the company access data. An intranet simply describes the network area that is normally accessed only by internal personnel. The wired LAN is affected by BYODs (bring your own devices) when the devices attach to the wired network. A college wireless LAN is most likely used by the tablet and smartphone. A wireless WAN would more likely be used by college students to access their cell provider network.

3 0
4 years ago
A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configurat
Dmitry [639]

Answer: b is good

Explanation:

5 0
3 years ago
Define knowledge management
abruzzese [7]
Knowledge management is the process of creating, sharing, using and managing the knowledge and information of an organisation. It refers to a multidisciplinary approach to achieving organisational objectives by making the best use of knowledge.
4 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Other questions:
  • Given the following HTML form snippet of markup, which of the following user inputs would meet the regular expression rule writt
    7·1 answer
  • Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a
    12·1 answer
  • Examine the following class definition:
    10·1 answer
  • Player casts 'Assassinate' on 'Acolyte of pain'. Acolyte's owner will:
    6·2 answers
  • The gene form of a trait is called a(n) ​
    10·1 answer
  • When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the c
    13·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • What's wrong with this python code i don't know what's wrong with both of them
    11·1 answer
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • Which is considered both an input and output device?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!