1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
6

To have a set of command

Computers and Technology
1 answer:
GalinKa [24]3 years ago
3 0

Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands.

You might be interested in
which of these is a placeholder in a document into which variable data is inserted during the process of a mail merge?
Margarita [4]

Answer: C. Merge Field.

The Merge Field is a placeholder that holds the variable data that will be inserted into the main document during a mail merge procedure. The columns in a document may represent the categories of information. The Rows represent the records of the different columns. The computer counts a row of data to be a single record.

7 0
3 years ago
Read 2 more answers
Describe the necessary Java commands to create a Java program for creating a lottery program using arrays and methods.
netineya [11]
I think each lottery ticket will cost £5 each so you would count in 5s till you reach the amount of tickets to get the answer which is £25
5 0
2 years ago
Read 2 more answers
Select the steps for adding artwork into a placeholder on a presentation slide. A. Select art from the tools menu. B. Double-cli
mojhsa [17]

Answer:

Double-click on the placeholder.

Navigate to and select the file you want.

5 0
4 years ago
Read 2 more answers
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
3 years ago
Drag the tiles to the boxes to form correct pairs.
Sergio [31]

Answer:

An overhead projector: requires slides to project images

A laptop: requires an external monitor to project high-resolution images

A computer: requires a CD-ROM drive to run presentation CDs

An external monitor: requires a port to connect to the laptop

Explanation:

The correct pair has been formed above. An overhead projector requires the slides for projecting images. A Laptop for projecting high-resolution images requires an external monitor. And a computer requires a CD-ROM drive for running presentation CDs, and an external monitor requires a port to a port which can be an HDMI port to connect to a laptop.

8 0
3 years ago
Other questions:
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • Dose the internet bring people together?
    15·1 answer
  • WILL UPVOTE ALL plz
    11·1 answer
  • Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz
    9·1 answer
  • What are the ten application areas of computer?​
    10·1 answer
  • I will make you brainless just answer all this question!!​
    14·1 answer
  • Can Anyone Send Me The Correct Code To This ?<br><br> ITS JAVA
    12·1 answer
  • Why does my Chromebook keep on turning my new tabs into clever tabs?
    13·2 answers
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!