1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
11

wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations

within the system and cannot always remember the commands.
Computers and Technology
1 answer:
andrezito [222]3 years ago
6 0

Answer:

The correct answer to use in filling in the gap is "Command languages interaction".

Explanation:

Command languages interaction occurs when the user enters command which are not always remembered, the computer executes it (with feedback if necessary), then requests next command.

This implies that under command languages interaction, "Command prompts" are employed by users who enter in commands and maybe certain parameters that impact how the command is executed.

Therefore, the correct answer to use in filling in the gap is "Command languages interaction".

You might be interested in
In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
RSB [31]

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

7 0
3 years ago
This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsExc
EleoNora [17]

Answer:

i dont know

Explanation:

7 0
3 years ago
Is designed to access a computer or operating system without the knowledge or permission of the user.
kramer

Answer:

Spyware

Explanation:

Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

5 0
2 years ago
Two files named numbers1.txt and numbers2.txt both have an unknown number of lines, each line consisting of a single positive in
Reika [66]

Answer:

see explaination for program code

Explanation:

scalar_product = 0

li=[]

li2=[]

#reading numbers1.txt and numbers2.txt intoli and li2 respectively

with open('numbers1.txt') as n1, open('numbers2.txt') as n2:

for line1 in n1:

li.append(int(line1))

for line2 in n2:

li2.append(int(line2))

#storing min list size into variable l

a=len(li)

b=len(li2)

if a<b:

l=a

else:

l=b

#calculating scalar product

for i in range(l):

scalar_product=scalar_product+li[i]*li2[i]

print("scalar product is",scalar_product)

6 0
3 years ago
What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
Katena32 [7]
Small programs stored on the harddrive that provide basic functionality for he devices listed would be called Hardware Drivers.
I hope this helps!
5 0
3 years ago
Other questions:
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • What are the 6 external parts of a computer system
    8·1 answer
  • Two technicians are discussing the voltage measurements taken on the circuit below: V1 = 12Volts; V2 = 12Volts; V3 = 0Volts; V4
    11·1 answer
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • Lux Ladies, Inc., is a company that specializes in expensive and unusual gifts for all occasions. It keeps a large file of infor
    11·1 answer
  • What type of control structure is the default method of the computer reading code?
    9·1 answer
  • When an interrogator speaks highly about how a crime was committed, hoping to get the suspect to brag about his or her involveme
    7·2 answers
  • A modern version of the BIOS firmware is called?
    12·1 answer
  • Name the sections of an instruction.
    15·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!