1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
8

Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The

utilities The platform The software as a service
Computers and Technology
1 answer:
Zigmanuir [339]3 years ago
4 0

Answer: The graphical user interface

Explanation:

The graphical user interface (GUI) is a form of user interface that allows user of a device interacts with it through graphical icons or cursors, text based commands or audio commands. The functionality of a GUI is a consequence of the direct manipulation of its graphical elements. Specialized GUIs that allows for speech based commands are called natural user interfaces.

You might be interested in
________ can be written only once. The data cannot be erased or written over once it is saved.​
notka56 [123]

Answer:

WORM (Write Once, Read Many)

Explanation:

The full meaning which means Write Once, Read Many implies that data can only be entered (or better put, written) once. Once the data has been written, the data can not be updated or deleted. However, the data being stored on WORM can be read as many times, as possible.

Hence, WORM answers the question.

6 0
2 years ago
Answer this blank:<br><br> Air enters through the mouth or nose, and travels through the _
Schach [20]
Respiratory system ?. Or esophagus?
5 0
3 years ago
Read 2 more answers
Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
zimovet [89]

Answer:

Matlab code is:

>> M=reshape(1:2:29, 3,5)

>> \%  (a)

>> Va=M(3,:)

>> \% (b)

>> Vb=M(:,4)

>> \% (c)

>> Vc=[M(2,:) M(:,3)']

Explanation:

>>\% \ Making\ the\ Matrix\ With\ required\ terms\ 1\ to\ 29\ with\ spaces\ of\ 5\ in\ three\ rows

>> M=reshape(1:2:29, 3,5)

M =

              1   7  13  19  25

              3  9  15  21  27

              5  11  17  23  29

>> \%  (a)

>>\%\ Slicing\ M\ \ from\ third\ row\ till\ end

>> Va=M(3,:)

Va =\\\ 5\ 11\ 17\ 23\ 29

>> \% (b)

>>\% \ Slicing\ the\4th\ column\ of\  M\ matrix\

>> Vb=M(:,4)

Vb =\\ 19\\ 21\\ 23\\

>> \% (c)

>>\% \ slicing\ the\ 2nd\ row\ and\ 3rd\ column\ of\ M\ Matrix\ and\ combining\ them\ to\ make\ a\ row\ matrix

>> Vc=[M(2,:) M(:,3)']

Vc =\\ 3\ 9\ 15\ 21\ 27\ 13\ 15\ 17

>>

The code is tested and is correct. If you put a semi colon ' ; ' at the end of every statement then your answer will be calculated but matlab doesn't show it until you ask i.e. typing the variable (Va, Vb, Vc )and press enter.

6 0
3 years ago
A network needs to be set up with 60 subnets. Given the IPv4 class C address 192.168.100.0, what subnet mask value should be use
d1i1m1o1n [39]
We are asked for the subnet mask and the total usable host. There are given values such as a network needs to be set up with 60 subnets given that the IPv4 class C address 192.168.100.0. The subnet mask is "255.255.255.0". The total host is "254".
6 0
3 years ago
Databases offer many security features including passwords to provide authentication, access levels to determine who can access
Murljashka [212]

Answer:

True

Explanation:

When using databases in a project, not everyone has the same access level, e.g the database admin may have the highest level of access (access to data on live mode), the software testers have their own level of access (access to data on test mode) and so on.  

7 0
3 years ago
Other questions:
  • Select all that apply. Given the following code fragment, which of the things shown below happen when the statement on line 8 ex
    13·1 answer
  • Binary code what does this mean I was sick so I don't under stand
    7·2 answers
  • (You don’t have to answer it’s just for you for points. Here is you’re riddle)
    9·2 answers
  • Testing a function or program using test values that are at or near the values that change the outcome of the program is known a
    13·1 answer
  • Where can i watch bnha movie 2 online for free, with no sign up or pay?
    6·2 answers
  • Describe a cellular network, its principle<br> components and how it works.
    7·1 answer
  • It took her 9 more months but Marina has managed to save the full $725 plus more to cover fees to pay off the pay-day loan compa
    9·1 answer
  • Help plz!! I will mark brainliest
    15·2 answers
  • When the user types into a Textbox control, the text is stored in the control's __________ property.
    6·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!