1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
4 years ago
10

Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us

er interface is she using here?
A)command-line interface
B)touch-screen interface
C)program-based interface
D)graphical user interface
E)virtual interface
Computers and Technology
1 answer:
Bad White [126]4 years ago
7 0

graphical user interface would be the correct answer, command line isn't right because you would have to type to run the program rather than just click it

You might be interested in
g Create your own data file consisting of integer, double or String values. Create your own unique Java application to read all
Jlenok [28]

Answer:

See explaination

Explanation:

//ReadFile.java

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

public class ReadFile

{

public static void main(String[] args)

{

int elementsCount=0;

//Create a File class object

File file=null;

Scanner fileScanner=null;

String fileName="sample.txt";

try

{

//Create an instance of File class

file=new File(fileName);

//create a scanner class object

fileScanner=new Scanner(file);

//read file elements until end of file

while (fileScanner.hasNext())

{

double value=fileScanner.nextInt();

elementsCount++;

}

//print smallest value

System.out.println(elementsCount+" data values are read");

}

//Catch the exception if file not found

catch (FileNotFoundException e)

{

System.out.println("File Not Found");

}

}

}

Sample output:

sample.txt

10

20

30

40

50

output:

5 data values are read

5 0
3 years ago
CODING IN C++ URGENT HELP PLEASE
forsale [732]

Answer:

this is hard i thought i knew it wow u have hard stuff in your school

Explanation:

7 0
3 years ago
When utilizing the Internet Storage Name Service (iSNS), how can you limit which targets iSCSI initiators can discover and conne
Sati [7]

Answer:

You can limit by devices IQN, DNS name, MAC address, IP address

Explanation:

When you configure an iSCSI target, you define which iSCSI initiators can connect to an iSNSI by the client's IQN. You can also specify which servers can connect to the iSCSI target based on MAC addresses, IP address, and DNS name.

6 0
3 years ago
Which database item would show details such as a customer’s name, their last purchase, and other details about a customer
WARRIOR [948]
It would be a table...most likely in a CRM or Sales database
4 0
3 years ago
Read 2 more answers
g 1-1 Which network model layer provides information about the physical dimensions of a network connector like an RJ45
Harlamova29_29 [7]

Answer:

Physical layer

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

In the OSI model, the physical layer is the first and lowest layer. Just like its name physical, it addresses and provides information about the physical characteristics such as type of connector, cable type, length of cable, etc., of a network.

This ultimately implies that, the physical layer of the network (OSI) model layer provides information about the physical dimensions of a network connector such as a RJ45. A RJ45 is used for connecting a CAT-5 or CAT-6 cable to a networking device.

8 0
3 years ago
Other questions:
  • How do social media sites illustrate kindness?
    15·1 answer
  • Write a JavaScript statement to convert "Information Technology" to uppercase.
    6·1 answer
  • What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
    11·1 answer
  • Force field meaning in science fiction
    6·1 answer
  • Hello my friends i am trying to reboot my i phone 4 but i could not i tried many ways can u help me
    14·1 answer
  • Please tell me what is basic HTML tags and its function please ​
    8·1 answer
  • Name various phases of SDLC in Rational Unified Process (RUP)
    7·1 answer
  • What finger should be on the Y key?
    12·2 answers
  • Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
    11·1 answer
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!