1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
13

Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD tele

vision, fitness watch, or microwave oven. Pick one specific device and discuss how well its interface is designed and how easy it is to use. Does the device use the same techniques as computer system interfaces, such as menus and icons
Computers and Technology
1 answer:
Vadim26 [7]3 years ago
7 0

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

You might be interested in
Name two devices that use control knobs to set the level of gadget​
kaheart [24]

Answer:

Control knobs are a simpler type of input hardware and one of the most common components in control systems, and are found on all sorts of devices from taps and gas stoves to optical microscopes, potentiometers and radio tuners.

6 0
3 years ago
Why you chose BSIT?​
chubhunter [2.5K]

Answer:

Because of choice.

Explanation:

meaningful Question py

6 0
3 years ago
Read 2 more answers
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
After the following code runs, what will be the value of result? var x = 30; function get () { return x; } function set (value)
PilotLPTM [1.2K]

Answer:

Null

Explanation:

It entirely depends on the language you are using to implement this.

But generally by the rule of scope, "result" will return null since get() was not defined to accept any argument, and it neither know the global "x" not defined it's own x in the function.

5 0
3 years ago
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
Other questions:
  • How many bits do you need to count up to 30 help please
    14·1 answer
  • How to transfer photos from iphone to iphone?
    14·2 answers
  • Which career field has grown most as a result of technological changes?
    13·1 answer
  • Body paragraphs in a report have a first-line indent of _____ inch. *
    9·1 answer
  • Create a Python program by defining a function that calculates the year of birth of a person whose age is known to you.(You may
    7·1 answer
  • A customer has an application that is used by enterprise customers outside of AWS. Some of these customers use legacy firewalls
    9·1 answer
  • Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a
    8·1 answer
  • Question # 4
    5·1 answer
  • What does hashing mean when it comes to cryptography?
    15·2 answers
  • Identify the programming language released by
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!