1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
15

Pls help I don’t know the answers

Computers and Technology
1 answer:
kifflom [539]3 years ago
4 0

Answer:

1. DLL Files.

2. System software repair.

3. Software configuration.

4. Human-computer interaction.

5. A graphical user interface (GUI).

Explanation:

1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.

2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.

3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.

4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.

5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.

You might be interested in
Each instruction that the CPU receives contains two parts -
Artist 52 [7]
E :) ahksksowokskxksos
4 0
3 years ago
Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
emmasim [6.3K]

Answer:

Options (a), (b) and (d)

Explanation:

  • Option (a) is true that the computers have become smaller and smaller with advancement of the technology. The earlier version of computers used vacuum tubes and are very big in size.
  • As the years passed and due to the advancement of the transistors the computers have become smaller in size.
  • Option (b) is true. With the advancement in the research in circuits used in the computer like Integrated Circuits the computers have become faster.
  • The response time of the operating system has reduced drastically.
  • Option (c) is wrong option. The computers have become cheaper. The transistors are cheaper compared to the vacuum tubes which are used in the earlier computers.
  • The price of the same computer (memory and time efficiency) has become less in the coming years than in the previous years with the advancement in the research of transistors.
  • Option (d) is true. Now-a-days computers support more and more number of applications. Computers has more number of applications in various and diversified fields.
  • With the advancements in the computers, the computers are finding more applications in different fields like medicine, law, transport industries etc.
5 0
4 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
Michale spent 80 minutes at the libary he finished studying at 4:00 what time did michale start studying
Papessa [141]

Answer:

He finished at 2:40 P.M.

Explanation:

This is because 80 minutes= 1 hour and 20 minutes. Add 1 hour and 20 minutes to 2:40, which equals 4:00.

7 0
4 years ago
Adele’s mother owns a Daycare and she wants to learn all about this business, to help her mom and own it one day. Which CTSO sho
Gennadij [26K]

Answer:

She should join the Future Business Leaders of America–Phi Beta Lambda

Explanation:

CTSOs are Career and technical student organizations. These organizations are vocational and extracurricular groups based primarily in high schools, colleges and career technological centres, for students in Career and Technical Education. They are important parts of the high school and college programs.

The Future Business Leaders of America–Phi Beta Lambda prepares students to become community-minded business leaders. It provides opportunities to learn career skills and gain leadership experience.

Therefore Adele should pick this CTSO

7 0
4 years ago
Other questions:
  • Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
    11·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Find the 65th percentile from the data. The data consist of class interval from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and freq
    8·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • Internet is for everyone but it wont be if its users cannot protect their privacy and the confidentiality of transactions conduc
    6·1 answer
  • Choose all the answers that apply.
    15·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    7·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!