1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
3 years ago
11

The 'WIMP' environment is much more user friendly,why?​

Computers and Technology
2 answers:
zvonat [6]3 years ago
3 0

Answer:

because hed like to be a friendly person who is like to be not a friendly good person is my answer is wrong change it if wrong

777dan777 [17]3 years ago
3 0

Answer:

En la interacción humano-ordenador, WIMP es sinónimo de "ventanas, iconos, menús y puntero",1​2​3​ que denota un estilo de interacción con estos elementos de la interfaz de usuario. Fue acuñado por Merzouga Wilberts en 1980.4​ A veces se utilizan otras extensiones, sustituyendo "ratón" y "ratones", o "menú desplegable" y "apuntador", para referirse a "menús" y "punteros", respectivamente.

Explanation:

You might be interested in
A computer has dose not have ___________
Ksivusya [100]

Answer:

A computer does not have brain of its own

4 0
2 years ago
Read 2 more answers
Which property is assigned to a file by the operating system?
Zolol [24]
Your answer would be a type
7 0
3 years ago
Have you ever used a device that relies solely on the cloud?
Morgarella [4.7K]
Yeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeesss i have
8 0
3 years ago
What is a biometric scanner?
Lisa [10]
<span>an electronic device used to determine a person's identity by detecting and matching the person's physical features, such as fingerprints or the eyes, to a database</span>
3 0
3 years ago
Read 2 more answers
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Other questions:
  • In the C-SCAN disk scheduling algorithm, the disk arm is required to move in one direction only until it reaches the last track
    7·1 answer
  • What type of data visual would you use to illustrate trends over time? Gantt chart Bar graph Line chart Scatter diagrams
    5·1 answer
  • A network administrator needs information about the printers that employees can access. Where can he find the information? The a
    10·2 answers
  • What is TRUE about the following array?
    15·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • Which type of error is a random error
    13·2 answers
  • The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
    14·1 answer
  • Which of the following is NOT a reason to include comments in programs
    10·2 answers
  • Explain the following terms <br><br>copyleft:<br><br>creative Commons:<br><br>GNU/GPL:​
    8·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!