1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
15

Pls help I don’t know the answers

Computers and Technology
1 answer:
kifflom [539]3 years ago
4 0

Answer:

1. DLL Files.

2. System software repair.

3. Software configuration.

4. Human-computer interaction.

5. A graphical user interface (GUI).

Explanation:

1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.

2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.

3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.

4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.

5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.

You might be interested in
What type of account provides the same functions as managed service accounts but can be managed across multiple servers as in a
damaskus [11]

Answer:

group managed service account

Explanation:

A group managed service account gMSA is  a extension to the standalone Managed Service Account (sMSA). sMSA is a managed domain account that automates password management, simplifies service principal name (SPN) management and delegates  management to other administrators. it was introduced in Windows Server 2008 R2 and Windows 7.  However, the group Managed Service Account (gMSA) provides all the functionalities of an sMSA but also extends this functionality over multiple servers.

6 0
3 years ago
1. List three tabs that make up the Ribbon
Roman55 [17]

Answer:

To create actions panes

On the Project menu, choose Add New Item.

In the Add New Item dialog box, select ActionsPaneControl, and then choose Add.

The ActionsPaneControl1.cs or ActionsPaneControl1.vb file opens in the designer.

From the Common Controls tab of the Toolbox, add a label to the designer surface.

In the Properties window, set the Text property of label1 to Actions Pane 1.

Repeat steps 1 through 5 to create a second actions pane and label. Set the Text property of the second label to Actions Pane 2.

Explanation:

hope it helps

3 0
2 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Write the statements needed so that the variable secondWord is associated with the second word of the value of sentence . So, if
professor190 [17]

Answer:

Explanation:

String str = "Broccoli is delicious.";

String[] Secondstr = str.split(" ");

System.out.println("second word is " + Secondstr[1]);

3 0
3 years ago
Order the steps to use a logical argument as a rule type.
muminat

Answer:

Click home tab, click conditional formatting, click new rule, use formula to determine

6 0
2 years ago
Read 2 more answers
Other questions:
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
    9·1 answer
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • When adopting the use of social media in emergency management, it is important to have
    10·1 answer
  • Which of the following is another type of brake system used in trucks
    5·1 answer
  • A(n) ______ has moving mechanical parts, which makes it less reliable than solid-state drives, but its metal platters are sealed
    9·2 answers
  • What is the output for the following program?
    6·2 answers
  • Which of the following uses the proper syntax for creating an HTML comment?
    8·1 answer
  • Explain the use of mail merge feature. <br>pls help​
    9·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!