1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
3 years ago
11

The 'WIMP' environment is much more user friendly,why?​

Computers and Technology
2 answers:
zvonat [6]3 years ago
3 0

Answer:

because hed like to be a friendly person who is like to be not a friendly good person is my answer is wrong change it if wrong

777dan777 [17]3 years ago
3 0

Answer:

En la interacción humano-ordenador, WIMP es sinónimo de "ventanas, iconos, menús y puntero",1​2​3​ que denota un estilo de interacción con estos elementos de la interfaz de usuario. Fue acuñado por Merzouga Wilberts en 1980.4​ A veces se utilizan otras extensiones, sustituyendo "ratón" y "ratones", o "menú desplegable" y "apuntador", para referirse a "menús" y "punteros", respectivamente.

Explanation:

You might be interested in
Emily loves her job as an executive recruiter for a large hospital located in Seattle, Washington. Part of Emily's job requires
Nana76 [90]

Answer:

D. Collective intelligence

Explanation:

Collective intelligence appears when people work together. It is derived  from the collaboration, collective actions, and competition of many parties.

In Emily's job, she collaborate with partners, compare competitors and tap into the knowledge of prospective employees, partners, and customers. Thus, she performs collective intelligence.

3 0
3 years ago
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
3 years ago
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
What does an industry expect of you as an employee?<br><br> At least 3 please!
Hatshy [7]
Trusting, loyal, and a hard worker. All indristies want employees who won't backstab, works hard, and is loyal to the company
7 0
3 years ago
Read 2 more answers
Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume
IceJOKER [234]

Answer:

when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements

Explanation:

3 0
3 years ago
Other questions:
  • HELP PLEASE
    5·1 answer
  • The item that is clicked in a JList can be retrieved using the _____ method of JList.
    8·1 answer
  • Give three facts about the history of the train shongololo
    9·1 answer
  • You are given 6 training examples for a binary classification problem as follows:
    12·1 answer
  • 6.4 Predicting Prices of Used Cars. The file ToyotaCorolla.csv contains data on used cars (Toyota Corolla) on sale during late s
    5·1 answer
  • What is the law of the XNOR logic gate?
    10·1 answer
  • Name an analog quantity other than temperature and sound
    13·1 answer
  • You are asked to provide a list of security groups a user is a member of. You write a script to pull the data from Active Direct
    11·1 answer
  • 2.4 Code Practice: Question 2
    5·1 answer
  • How to scan a screenshot on Brainly?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!