1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
11

This provides an easy method for workers to use their computers.

Computers and Technology
2 answers:
dsp733 years ago
7 0
C: GUI or Graphical User Interface. 
A: Dos is an operating system (MS Dos)
B Fat is a file format for drives
D: Ram is one of the many things that makes a computer work
mafiozo [28]3 years ago
6 0

the  correct  one is c.gui its The operating systems of most computers used in businesses, schools, and the home function in a graphical user environment that makes it relatively simple for people to interact with their computers.

 c.gui


You might be interested in
What term specifies how information systems resources should be used and how they should work together?
jarptica [38.1K]

Answer:

b.Information systems architecture

Explanation:

Information System Architecture defines a system in terms of its resources and how they interact with each other. Some aspects of the Information System Architecture include the data that is managed by the system and the architecture of the application software. Another aspect is configuration, which involves the hardware architecture of the system. The organization of the system takes a look at the maintenance of the system while the communication aspect architecture looks at the networks that link the different resources e.g topology diagrams.

6 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a
soldi70 [24.7K]

Viruses and malware are common and can have drastically negative results on your computer and life.

You can often tell that your computer is infected because it acts weird or slow.

Active antivirus software is a good way to prevent these problems.

4 0
3 years ago
Was the big blue button thing a good decision or bad?<br> *I think it was a bad idea.
Gala2k [10]

sorry i just got banned so delete this answer plz i was banned and i wanted to see if they unbanned me

8 0
4 years ago
Read 2 more answers
1. You want to find if TCP/IP Services are working properly on your Computer, you would use which command? a. PING LOCALHOST b.
Olegator [25]

Answer:

Option A

Explanation:

Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.

Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.

Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.

3 0
3 years ago
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be tran
    6·1 answer
  • Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0
    6·1 answer
  • Flowcharts allow you to more easily clarify among multiple potential solutions to a problem to see which solution is best.
    5·1 answer
  • Select the pieces of information that are added on to data to get it where it is going.
    5·1 answer
  • Julie has a difficult time seeing her computer Screen and uses adaplive technology tools to help he see better. One of the tools
    13·2 answers
  • HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
    14·1 answer
  • During the POST process, the BIOS uses two (2) different ways to notify you of a problem, Error beep codes and error messages, e
    10·1 answer
  • Value (related to the five 'v's' of big data) addresses the pursuit of a meaningful goal. true false
    14·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!