1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
3 years ago
8

Write a definition in your own words for GUI. Do not copy and paste please.

Computers and Technology
2 answers:
Goryan [66]3 years ago
8 0

Answer:

something where you can interact with and it takes you somewhere. for example, you click g00gle and it takes you to g000gle.

Explanation:

Ivan3 years ago
6 0

Answer:

TBH I call it windows interface screen

Explanation:

You might be interested in
) The ________ displays a text box and button for users to browse, select, and upload a file. (Points : 3)
Vinil7 [7]
Upload text box control
6 0
3 years ago
Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
Alenkasestr [34]

Answer:

True.

Explanation:

When there is delay and congestion in the network, we have to assign priority to some packets to avoid data loss. Class of service (CoS) does this prioritization by grouping similar traffic types such as ,voice, streaming video,e-mail etc. into classes.then it utilizes different levels(usually eight) of priority.It also modifies PCP field in 802.1q tag.

4 0
3 years ago
When conducting research, protecting the privacy of patients requires careful attention to ensure ?
Eddi Din [679]
When conducting research, protecting the privacy of patients requires careful attention to ensure PRIVACY/CONFIDENTIALITY.
3 0
4 years ago
Read 2 more answers
Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
lyudmila [28]

Answer:

a) 20 MB

b) 10 MB

c) 18 MB

Explanation:

First fit method works by keeping list of jobs which are ordered by memory location. This list of jobs contains free/busy status. Free means that hole is available and it takes the memory requests and busy is for the memory space is occupied.

In first fit method the first process takes the first available hole or memory with space greater than or equal to the size of the job. OS assigns process to nearest memory partition available with sufficient size.

For the request for 12 MB the hole with size 20 MB is taken as its nearest memory location of sufficient size than 10 and 4 MB. Now the status of this is busy as its taken by a job.

Next for the request of 10 MB the sufficient nearest memory hole is 10 MB as its equal to the size of the job. The status is changed to busy.

Next for the request of 9 MB the sufficient nearest hole is 18 MB as the 10 and 20 MB are already taken and 4 MB is not sufficient so the first sufficient available hole is of 18 MB.

5 0
3 years ago
Easy way of communication with people is one disadvantage of a network. *<br><br> 1.True<br> 2.False
Maksim231197 [3]

Answer:

false

because we are able to connect with people easily..

without have to wait for long time in the case of letters..

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the purpose of the backoff on Ethernet networks?
    5·1 answer
  • Whenever I try to plug in my code it will not work. I also need to add 4 more polygons and I don't know where.
    11·1 answer
  • The difference between a want and a need is a want is not necessary for survival. Things necessary for survival are known as ___
    6·1 answer
  • Whats the best app for cheaters​
    9·1 answer
  • Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatog
    13·1 answer
  • What type of data would a RDBMS store in a linked list, two-way linked list, or B-trees? What are the advantages and disadvantag
    5·1 answer
  • The final wrap-up after the conflict is resolved is called the __________________________.
    8·1 answer
  • A unique aspect of Java that allows code compiled on one machine to be executed on a machine of a different hardware platform is
    8·1 answer
  • Digital computers use a........ system to encode date and programs.<br>​
    8·1 answer
  • When correctly implemented, what is the only cryptosystem known to be unbreakable?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!