1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
2 years ago
7

Which of these is NOT an example of a GUI?

Computers and Technology
1 answer:
aksik [14]2 years ago
5 0

Answer:

The answer to this question is given below in the explanation section.  

Explanation:

First, we need to know what is the graphic user interface (GUI)?

A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.

so, in the context of the question, the following are examples of GUI.

Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.

Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.

The followings are not the example of GUI:

Microphone and USB cord because these are the electronic parts and they don't possess the GUI.

You might be interested in
A ________ database state is one in which all data integrity constraints are satisfied
beks73 [17]
A consistent database base is one in which all data integrity constraints are satisfied.
8 0
3 years ago
Read 2 more answers
When an interrogator speaks highly about how a crime was committed, hoping to get the suspect to brag about his or her involveme
Alexeev081 [22]

I’d go with b. egotistical, i’m not entirely sure though. It seems like he is trying to appeal to the suspects EGO

8 0
3 years ago
Read 2 more answers
1 point
stealth61 [152]

Answer:

adwawdasdw

Explanation:

4 0
2 years ago
Read 2 more answers
Write a destructor for the CarCounter class that outputs the following. End with newline.
ycow [4]

Answer:

Following are the code to this question:

CarCounter::~CarCounter()//Defining destructor CarCounter

{

cout << "Destroying CarCounter\n";//print message Destroying CarCounter

}

Explanation:

Following are the full program to this question:

#include <iostream>//Defining header file

using namespace std;

class CarCounter //Defining class CarCounter

{

public:

CarCounter();//Defining constructor CarCounter

~CarCounter();//Defining destructor CarCounter

private:

int carCount;//Defining integer variable carCount

};

CarCounter::CarCounter()//declaring constructor  

{

carCount = 0;//assign value in carCount variable

return;//using return keyword

}

CarCounter::~CarCounter()//Defining destructor CarCounter

{

cout << "Destroying CarCounter\n";//print message Destroying CarCounter

}

int main() //Defining main method

{

CarCounter* parkingLot = new CarCounter();//Defining class object parkingLot

delete parkingLot;//

return 0;

}

  • In the given C++ language code, a class "CarCounter" is defined, and inside the class, a "constructor, Destructors, and an integer variable" is defined.  
  • Outside the class, the scope resolution operator is used to define the constructor and assign value "0" in the integer variable.  
  • In the above-given code, the scope resolution operator, to define destructor and inside this cout function is used, which prints a message.  
  • In the main method, the class object is created, which automatically calls its class constructor and destructors.  
7 0
3 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
3 years ago
Other questions:
  • Scratch and grinding marks on sedimentary rocks indicate which type of environment?
    6·1 answer
  • Why is it important to ask an interviewer at least one question at the end of an interview?
    12·2 answers
  • You want to join your computer to a homegroup but you don't see any homegroups on your home network
    11·1 answer
  • Write an algorithm in pseudocode (following the style of the Minimax pseudocode) that will always make an optimal decision given
    13·1 answer
  • You’re configuring a Web-based intranet application on the WebApp server, which is a domain member. Users authenticate to the We
    13·1 answer
  • The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the databas
    14·1 answer
  • I'm bad i'm mrs puff doo doo doo yeah it's a holiday
    6·2 answers
  • 1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee
    5·1 answer
  • A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, the
    11·1 answer
  • ________ has the ability to drag windows to the edges or corners of your screen and have them snap into place.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!