1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
3 years ago
12

What is the full form of GUI​

Computers and Technology
2 answers:
adell [148]3 years ago
7 0

Answer:

Graphical User Interface

77julia77 [94]3 years ago
3 0

Answer:

(GUI) stands for Graphical User Interface

You might be interested in
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
What is a WYSIWYG program?
Anna11 [10]

Answer:

A. A program that allows you to see what the HTML code will look like in text form on the site

General Formulas and Concepts:

<u>Intro to Digital Tech</u>

  • HTML
  • CSS

Explanation:

WYSIWYG, or What You See Is What You Get, is a program designed to allow the user to preview what the HTML code would look like as a final product.

B is incorrect because we use CSS to change font, color, and other things to HTML.

C is incorrect because tutorials can be found online and would not need a program to teach HTML terminology.

D is incorrect because that would be debugging and would use AI and Smart-Sense Intelligence from the coding platform.

6 0
3 years ago
I have a problem with Instagram.
krok68 [10]

Answer:

developer tool

Explanation:

if you're using chrome click on the 3 dots that's in the top right corner and go to tools, you will see "developer tools" and click on that, then you will see an icon that shows a laptop/computer and an iphone click on that and you can even choose the type of phone you wish to see the view of (ex. iphone X), refresh the page and you will be able to see the direct message icon and you will be able to message your friend.

good luck.

5 0
3 years ago
A client is attempting to access a secure Wi-Fi network. To be successful, which action would the client need to do
solniwko [45]
Secure WiFi used passwords, so the client needs to have the correct password
7 0
2 years ago
The interaction between information technology and organizations is influenced___________.A) solely by the decision making of mi
Brums [2.3K]

Answer: C. Many factors including structure, politics, culture, and environment.

Explanation:

An organization is a formal establishment which is geared at production of goods or rendering of services. Information Technology plays an important role in an organizations activities for it helps the firm realize its goals.

Any technology an organization intends to use must conform to its methods of production as well as the way the organization does things (culture). For example, the importance of computers in an organization like a Bank which holds a lot of information in its database cannot be overemphasized.

The environment of the organization made up of competitors, regulatory agencies, customers, etc. would also influence the kind of information technology used by the organization.

7 0
4 years ago
Other questions:
  • What are the primary functions of motor oil? a. Reduce friction and prevent wear b. Keep engine surfaces clean c. Remove heat to
    11·1 answer
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • Write the definition of a function square, which receives an integer parameter and returns the square of the value of the parame
    14·1 answer
  • Write a pseudocode algorithm which asks the user to enter a password.if the user enters “NotAtHome” then print “welcome”
    15·1 answer
  • Given four inputs: a, b, c &amp; d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
    6·1 answer
  • How to get the level 100 tier in fortnite please help <br><br><br><br> pssss. just a troll m8 ;)
    12·2 answers
  • Which operating system is a version of Linux?​
    13·1 answer
  • Free Write Friday 2/26/21
    8·1 answer
  • A company Digicom Parts manufactures 2 types of unique products for laptop and desktop computers. It manufactures 10 types of la
    15·1 answer
  • Let cell E2 = 100, what is the result of this formula? =NOT(E2&lt;100) *
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!