1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
15

Pls help I don’t know the answers

Computers and Technology
1 answer:
kifflom [539]3 years ago
4 0

Answer:

1. DLL Files.

2. System software repair.

3. Software configuration.

4. Human-computer interaction.

5. A graphical user interface (GUI).

Explanation:

1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.

2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.

3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.

4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.

5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.

You might be interested in
How can the function anotherFunc2 change the contents of the second element of t?
weeeeeb [17]

Answer:

a)change t[1].

Explanation:

The array stores elements in serial order.It keeps an index associated to every element of the array and the indexing start form 0 to size-1.So to access the second element in the array it's index will be 1.So to access the second element we have to write arrayname[1];

In our case the array name is t.

So t[1];

Hence the answer is change t[1];

5 0
3 years ago
If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
Free_Kalibri [48]

The reason one bother creating other user accounts so that others such as friends can be able to make some changes that you want them to do and it is also to make sure that an administrator does not inadvertently make alterations  without knowing that is any form of administrative change.

<h3>What Does Administrative Privileges Mean?</h3>

The term Administrative privileges are known to be the ability to have or create some major changes to any given system, such as an operating system.

Note that based on the above, The reason one bother creating other user accounts so that others such as friends can be able to make some changes that you want them to do and it is also to make sure that an administrator does not inadvertently make alterations  without knowing that is any form of administrative change.

Learn more about administrator privileges from

brainly.com/question/26389124

#SPJ1

8 0
1 year ago
What kind of company would hire an Information Support and Service employee?
Murrr4er [49]

Answer:

B. Computer Repair

Explanation:

I got it right on edge. trust.

7 0
2 years ago
Read 2 more answers
Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
yanalaym [24]

Answer:

B

Explanation:

5 0
3 years ago
Small-business owner Marcos set up his Google Ads campaign by thinking of “obvious” keywords off of the top of his head. What's
LiRa [457]

Answer:See the suggestions on the Opportunities tab

Explanation: The improvement in the Google ad can be made by the taking a look at the Opportunities tab which will display the adequate opportunities.

The tab displays these opportunities on the basis of the campaign settings, account's history, performance, style, trends etc and thus will create the appropriate opportunities accordingly.Thus Marcos will have to see the suggestion displayed on Opportunities tab

5 0
3 years ago
Other questions:
  • Match each vocabulary word to its definition.
    8·1 answer
  • Which of the following cannot be performed from the windows task manager?
    15·2 answers
  • With which type of media are you interacting when you read an online shopping website?
    7·1 answer
  • The four key stages with regards to data visualization workflow. Select one key stage and explain it briefly about that stage.St
    10·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • Mariah was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to s
    13·2 answers
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Read each of the following statements about Computer Science and explain why you think that statement is true.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!