1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
11

wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations

within the system and cannot always remember the commands.
Computers and Technology
1 answer:
andrezito [222]3 years ago
6 0

Answer:

The correct answer to use in filling in the gap is "Command languages interaction".

Explanation:

Command languages interaction occurs when the user enters command which are not always remembered, the computer executes it (with feedback if necessary), then requests next command.

This implies that under command languages interaction, "Command prompts" are employed by users who enter in commands and maybe certain parameters that impact how the command is executed.

Therefore, the correct answer to use in filling in the gap is "Command languages interaction".

You might be interested in
What Linux services can pose a problem when attempting to reach remote host on a network?
nekit [7.7K]

Answer:

NFS configuration

Explanation:

The Linux server runs the Linus open source operating system that provides a stable, secure and more flexible environment to carry out more challenging jobs like network and system administration, database management and web hosting.

The NFS or Network file system configured on the Linux server only supports Linux servers communication. It mounts the storage of the server on the network for central access.

4 0
4 years ago
Read 2 more answers
When changing passwords, at least how many characters must be changed from the previous password?
frosja888 [35]

As we change password when

1. we forgot the previous password.

2. when the previous password is leaked due to some reasons.

In case 1 we can change the password to the same as well with no change the problem will be solved but for case 2 at least one or for more safety all characters should be changed.

8 0
3 years ago
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
3 years ago
Who is the three president of somalia​
Snezhnost [94]

Answer:

Siad Barre

Explanation:

3 0
3 years ago
Read 2 more answers
The best way for you to communicate with the school is through
REY [17]
A. Because you can easily call the school without wasting too much time
4 0
3 years ago
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • Write a new program called Lab7D that will read strings from a text file and turn them into "encrypted code". Create a bool func
    14·1 answer
  • A slideshow that accompanies an oral report is known as what?
    6·1 answer
  • 1. A tachometer measures:
    8·1 answer
  • Which two standards below represent newer versions of stp??
    13·1 answer
  • How are IP addresses usually written?
    7·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • How would you define the term technology
    8·1 answer
  • Salvado has a flash dish of is GB
    6·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!