1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
11

Features present in most GUIs include _____.

Computers and Technology
2 answers:
Natalija [7]3 years ago
7 0
Your answer is: 

Desktop, icons, menus, <span>windows.




I know this answer is correct because I just took the quiz with this question on it.</span>
atroni [7]3 years ago
3 0
Forms, Icons, Menus, Windows
You might be interested in
have you ever had to adjust your communicatio style to egage a customer or roommate? what was the situation and outcome?
atroni [7]
<h2>Answer: When I was the HR of my bank, one of our good customer was disappointed and was wanting to close his account. BM didn't want to loose him.</h2><h2 /><h2>Everybody tried to convince him but all in vain.</h2><h2 /><h2>Then ,I in my regional language and communication skills not only stopped him to close the account but also made him open a new account of his wife.</h2><h2 /><h2 />
7 0
3 years ago
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
I figured out the secret message in Dad feels good, I can connect the dots
kati45 [8]

Answer:

Nope you figured it out

Explanation:

3 0
3 years ago
The data-linking feature that allows Internet users to skip directly from a highlighted word to a related file in another comput
tamaranim1 [39]

Answer:

Hypertext

Explanation:

According to my experience on information technology, I can say that based on the information provided within the question the term being mentioned is called Hypertext. Like described in the question this term refers to a software system which shows as a highlighted piece of text that allows a user to immediately be taken to another system with information associated with the highlighted text that was clicked.

If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Read 2 more answers
When are numbered lists generally used?
laiz [17]
<span>C. when listing items that have an order of priority </span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • Please help with this
    5·2 answers
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Pick the simplest line of code to test if the word "BASIC" is stored in the variable text1.
    12·1 answer
  • Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
    11·2 answers
  • TRUE OR FALSE!!<br> Your location can be identified simply by turning on your cell phone..
    12·2 answers
  • Anybody wanna be friends?
    10·2 answers
  • How do I indent the 1. bullet so it is not lined up with the regular bullet above it?
    9·1 answer
  • How is technology moving the business world forward?
    13·1 answer
  • ____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!