1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MariettaO [177]
3 years ago
15

Operating systems that have windows and icons have which type of user interface?

Computers and Technology
1 answer:
777dan777 [17]3 years ago
4 0
A GUI (Graphical User Interface)
You might be interested in
A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​
Burka [1]

Answer:

R's share = 306

Explanation:

Sum of ratio = 1/3 + 1/2 + 1/5

LCM = 30

Sum of ratio = (10 + 15 + 6) / 30 = 31 /30

Profit to be shared = 1581

P = 1/3 ; Q = 1/2 ; R = 1/5

Share of R :

(Total profit / sum of ratio) * R ratio

[1581 / (31/30)] * 1/5

(1581 / 1 * 30/31) * 1/5

51 * 30 * 1/5

51 * 6 = 306

5 0
3 years ago
Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
mojhsa [17]

Answer:

<em>D. Separation of duties</em>

Explanation:

Separation of duties (SoD) is a fundamental concept in internal controls and is the hardest and often the most expensive to achieve.

<em>This aim is accomplished by distributing the tasks and associated permissions among multiple people for a specific security system.</em>

7 0
3 years ago
The incident results in huge losses of revenue as a result their mobile app service is withdrawn. Investigators discovered a vul
zlopas [31]

Answer:

The attackers used the code injection

Explanation:

<em>Because, the HMTL5 allows data and code to be mixed together, making code injection attacks possible. </em>

6 0
3 years ago
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
What are the steps for adding an action button to a slide? Choose the correct answers from the drop-down menus. 1. First, go to
Marysya12 [62]

Answer:

insert, illustrations, click and drag, slide show

Explanation:

i got it right

7 0
3 years ago
Read 2 more answers
Other questions:
  • Easy question how the internet has impacted y’all life
    13·1 answer
  • The data in a data warehouse have which of the following characteristics?
    13·1 answer
  • Write a function that accepts an integer parameter and returns its integer square root (if it exists). The function should throw
    12·2 answers
  • What do you think about the future of computers?​
    14·1 answer
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • Why do you think that network and telecommunications security careers are some of the fastest growing in the field of technology
    8·1 answer
  • 50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4​
    9·1 answer
  • 6
    9·1 answer
  • Four examples of computer virus​
    10·1 answer
  • Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all intege
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!