1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
11

What is this screen called? (I attached a picture)

Computers and Technology
2 answers:
Anna11 [10]3 years ago
8 0

Answer:

graph screen is the correct answer

sergiy2304 [10]3 years ago
4 0

Answer:

a

Explanation:

You might be interested in
The next page and previous page buttons allow you to navigate through a worksheet while in print preview mode.
MAVERICK [17]
That statement is true
7 0
3 years ago
To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on th
Elenna [48]

Answer bobobobobobobobo

4 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
The mainframe computer are the ____ and most ____ computers..​
Fittoniya [83]

Answer:

Mainframe computer are the larger system computers and most expensive computer.

4 0
3 years ago
Explain how signal detection theory can be used to analyze web site reading and searching. Based on this analysis, provide three
icang [17]

Answer:

Human visual behavior often includes searching, scanning, and monitoring.

While it should be possible to moderate the performance of these tasks based on the dimensions used in the table, it is often useful to analyze these situations using Signal Detection Theory (SDT).              

 

Three suggestions for my favourite search engine that includes search are:

1.  ensure that search results are graded according to the following categories using different colours:  

  • Most accurate and relevant results;
  • Accurate and slightly relevant results
  • Fairly accurate and fairly relevant results

These can help the users identify more easily the results to spend more time on. This categorisation can be done using colours. This is because of the way the eye functions. Unlike a camera snapshot, for example, the eye does not capture everything in a scene equally, but selectively picks out salient objects and features from the current context, and focuses on them so they can be processed in more detail.

2.  Another suggestion is that attention needs to be paid to where people look most of the time. It is not out of place for people to instinctively avoid search results that have dollar signs or currency signs especially when they are not searching for a commercial item.  

3. Lastly in displaying results that have images, it best to use sharp images. The theory suggests with respect to contrast, clarity and brightness that sharper and more distinct objects appear to be nearer, and duller objects appear to be farther away. To elicit the interest of the reader, targeted results or information from search engines must make use of the factors of contrast, clarity and brightness.

Cheers!

   

4 0
3 years ago
Other questions:
  • Invalid length parameter passed to the LEFT or SUBSTRING function (below)".
    6·1 answer
  • How auto insurance companies manage risk?
    12·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • Analyze the following code.
    10·1 answer
  • An individual posing as an online gamer accesses information stored in an unsuspecting user’s computer by placing a program in h
    11·1 answer
  • If you created a variable called name, what data type would that value be?
    7·2 answers
  • Visual Design includes 4 elements: shapes, texture, lines and form.
    6·1 answer
  • Question 2 (6 points)
    11·1 answer
  • Write and test a program that computes the area of a circle. This program should request a number representing a radius as input
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!