1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
6

When designing a user interface, you can choose between the _______ or ______ layout Group of answer choices

Computers and Technology
1 answer:
Dvinal [7]3 years ago
7 0

Answer:

command line interface, graphical user interface

Explanation:

User interface design, commonly known as UI design may be referred to a visual layout of the elements which a user  interacts with in using a particular website, or some technological product.

It mainly focuses on what the user might need to operate or use the webpage  or a product and it ensures that the it has easy accessing elements to control and use the product.

There are two common  type of designs of the user interface. They are :

-- command line interface which contains only text

-- graphical user interface containing images and graphics

You might be interested in
The region of the sky which reflects radio waves around the world is the .
aivan3 [116]

The ionosphere reflects those waves

6 0
3 years ago
When adding several user accounts, you might want to use the newusers utility, which can process a text file full of entries to
lara31 [8.8K]

Explanation:

Given - When adding several user accounts, you might want to use the new users utility, which can process a text file full of entries to add user accounts.

To find - Use the man or info page to find out how to use this utility, and use it to add three users.

Proof -

New Users Utility:

It is an utility which reads the file full of usernames and clear text passwords.

It then uses this information to update a group of the existing users to create new users.The format of the file consists of specified things like:

pw - passwd

pw - age

pw - gid

pw - dir

Use of the Utility:

The command is new users filename

The file should look like -

(Username : Password : UID : GID : User Information : Home Directory : Default Shell)

where ,

UID = User Identifier

GID = Group Identifier

Testing the Users:

Creating users from the file given above test User 1, directory Of File

Executing the create user new users directory Of File

Repeat this step to undergo all the users that are been noted down in the file to make them a user in the noted group policy.

Hence,

These are the steps of using the new Users utility.

4 0
3 years ago
Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users
Art [367]

Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

<h3>What is FDE in security?</h3>

Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.

Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

Learn more about Remote workers from

brainly.com/question/26512743

#SPJ1

5 0
2 years ago
True or false? a bus is a group of wires through which data travels within a computer.
hammer [34]
False.................... Lol
7 0
3 years ago
I want to discard my old computer and want to securely erase the data from my hard drive. What software can I use to do this and
Mariulka [41]
The process to securely erase the data from your hard drive is called wiping.

ANd for the software, there are several softwares that can be used for this, one of the example is :Darik's boot and nukes

Or if you want to do it the old fashioned style, just drill a hole in your hard drive.

Hope this helps
5 0
3 years ago
Other questions:
  • The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.
    15·1 answer
  • An approach to implementing a software application where little or no software is installed and local computers, where the data
    11·1 answer
  • A/an __ is a series of instructions or commands that a computer follows; used to create software
    14·1 answer
  • What formatting has been applied to this title?
    15·1 answer
  • Multiple Select
    12·1 answer
  • Can anyone help me this is due today :) <br> Thank you so much
    14·2 answers
  • Make this a meme please
    12·2 answers
  • _____________ are where you get down to business and enter data in a worksheet
    6·1 answer
  • Area of circle algorithm
    12·1 answer
  • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!