1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
14

In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.

Computers and Technology
1 answer:
marshall27 [118]3 years ago
7 0

Answer:

Option (2) i.e.,  process-control is the correct answer

Explanation:

In the following statement, Process-control screen provides users to send command to the system when the interface of the following users is mainly made up of in the older systems. So, that's why the user interface generally consists of a process-control screen which permits the user to transfer the following details in the system.

You might be interested in
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
In cell E14, enter a date function that calculates the number of days between the Initial Deadline (cell E10) and the Date Recei
tatuchka [14]

Answer:

The formula to enter in E14 is as follows:

=DAYS(D14,$E$10)

Explanation:

Required

Formula to calculate the number of days between E10 and D14

The syntax to do this is:

=DAYS(end_date,start_date)

So, we have:

=DAYS(D14,E10)

The question requires a mix of relative and mixed references because cell E10 will be constant in calculating the difference for dates in other cells.

In other words, the initial date is constant for all

So, the update formula is:

=DAYS(D14,$E$10)

Notice the $ between in E10; this represents mixed referencing

When dragged to E15 till E68, the formulas in the respective cells will be:

=DAYS(D15,$E$10) .............................. =DAYS(D68,$E$10)

7 0
3 years ago
A credit card can be a good way to pay when yo can’t afford something for a very long time? True or false
scoray [572]
False. Credit cards usually have high interest rates if you don’t pay them off right away. The only way to benefit from a credit card is if you pay it off by the due date monthly.
7 0
3 years ago
elements that have little or no effect on search results include . select all that apply. a. keywords b. stop words c. search op
myrzilka [38]

Elements that have little or no effect on search results include:

b. stop words.

d. capital letters.

<h3>What is a binary search?</h3>

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(log n)

<u>Note:</u> n is the total number of elements in a list.

In Computer technology, elements that have little or no effect on search results include he following:

  • Stop words.
  • Capital letters.

However, keywords and search operators are important elements that have a significant effect on search results.

Read more on binary search here: brainly.com/question/24268720

#SPJ1

6 0
2 years ago
Which of the following types of network is described in the statement below?"It represents a wireless network that connects two
jekas [21]

Answer:

B. WMAN

Explanation:

A WMAN or a wireless metropolitan area network is a network bigger than a WLAN (wireless local area network) but smaller compared to the WWAN or the wireless wide area network. It is used for long haul point to point and point to multipoint communication. It is a network, service providers use to connect LAN networks wireless within a city.

The WPAN is a small wireless network as compared to WLAN, that uses Bluetooth technology for connectivity.

6 0
3 years ago
Other questions:
  • A skier provides what in a landscape photograph of a mountain?
    14·2 answers
  • Why is musical notation important? What benefits do musicians and others receive from being able to write down and note aspects
    12·1 answer
  • What features are provided by most GUIs?
    7·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • Which of the following website is arguably considered the best site to search for scholarships
    8·2 answers
  • When you are saving a file, what does word suggest by default as the name of the document?
    8·2 answers
  • What can be used to help diagnose and fix network connection problems?
    8·1 answer
  • What is wrong with the following code? publicstatic char grade(int score) { if (score &gt;= 9) { return 'A'; } else if (score &g
    6·1 answer
  • I am in class 7 should I go with java or python.​
    6·1 answer
  • Question 2 of 25
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!