1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
11

The intuitive interface designed by alan kay is called a ________.

Computers and Technology
1 answer:
juin [17]3 years ago
4 0
GUI or Graphical User Interface
You might be interested in
explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”
tino4ka555 [31]

Answer:

Binary is made up of only 2 digits: a one and a zero. 1011 is eleven in our counting system.

So 10 in binary = 2 in our counting system.

Read the joke as follows. There are 2 types of people in the world: those who  understand binary and those who do not.

I guess it's not really that funny, but computer programmers like it.

6 0
1 year ago
(Please help, Urgent Need): How do I change my username
stealth61 [152]

Answer: create a different one

Explanation:

6 0
3 years ago
If a packet is highlighted by black, what does it mean for the packet?
KATRIN_1 [288]

Answer:

If a packet is highlighted by black what does it mean for the packet It shows that there is a bad Spanning. Hope this helps! Pls give me BRAINLIEST!!!! =)

8 0
4 years ago
Write a program that reads a value (n) and outputs "hello world" n times. if the value is 3 , the output will be "hello world" p
den301095 [7]
Is the value read from user input or from a file? Also, what language?
6 0
4 years ago
Detailed ___ highest risk warnings can incude identifiying which vendor updates apply to which vulnerablities as well as which t
BigorU [14]

Answer:

Intelligence  is the correct answer.

Explanation:

Because the high-risk intelligence is the complicated warning that can be involved in recognizing those vendors who update the following and apply it to the exposure in which defenses have been founded to work against the particular report of the vulnerability. So, that's why the following answer is not false.

4 0
3 years ago
Other questions:
  • B. Find Addition of Binary Numbers: 1100112 + 11012
    11·1 answer
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • What operating system component allows multiple computers to be linked together?
    10·2 answers
  • What is Livvyo? Livvyo review
    8·1 answer
  • When photographing wildlife, what type of lighting should you use?
    15·2 answers
  • Consider the following class definitions. public class BClass { private int x; public void set(int a) { x = a; } public void pri
    5·1 answer
  • A database design where certain data entities are combined, summary totals are carried in the data records rather than calculate
    5·1 answer
  • Which of the following application delivery methods requires Internet access?
    9·1 answer
  • State Newton’s second law of motion. Show that Newton’s first and third laws of motion are contained in the second law​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!