Most general-purpose applications use a(n) ________ that displays graphical elements called icons to represent familiar objects.

Answers

Answer 1

A general purpose application is often called a 'off-the-shelf'. It is a kind of software that one can use at home and school. Most general-purpose applications use a graphical user interface that displays graphical elements called icons to represent familiar objects.

The graphical user interface is simply defined as a type of user interface that gives users permission to interact with electronic devices via the aid of graphical icons and audio indicator such as primary notation.

General purpose application software is simply defined as a type of application that is used for different kind of tasks.

It is not known to be able to perform more than one function. For example, a word processor.

Learn more from

https://brainly.com/question/2919813


Related Questions

HELP ME!!!!!!! %) select all the correct answer. What will be the output of using the element in the given HTML code? 1011 2 A. 10112 B. 10112 C. 21011 D. 21011

Answers

Answer:

A or B

Explanation:

I'm not sure I used HTML a bit but I am not a pro on it so this might be not correct

Tell me if I'm wrong :)

Answer:

The answer is B: 1011 with the two under

Explanation:

I got it correct on my test.

Question 8 of 10
When is a table the most effective way to present information?
O A. When graphs are more expensive to create.
O B. When you want to show the parts of a whole.
O C. When you want to show how parts fit together.
O D. When you want to make many details available in an organized
way.

Answers

Answer:

C

Explanation:

Tables and figures are particularly effective when large amounts of information have to be presented and discussed in an effective way.

Answer:

D. When you want to make many details available in an organized way.

Explanation:

help me.............

Answers

Answer:

Explanation:

Sure

10 toes? Is that what you asked?

5 oceans entirely in the world.

300 bones in a baby and 206- In an adult body

Who are the primary users of erp systems?.

Answers

Explanation:

resellers, partners, suppliers, and distributors.

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

Answers

The CNSS model of information security evolved from a concept developed by the computer security industry known as the CIA triad .

Fill in the blank
please help.

_______________________ _____________________ software allows you to prepare documents such as _______________________ and _______________________. It allows you to _______________________, _______________________ and format these documents. You can also _______________________ the documents and retrieved it at a later date.

Answers

Answer:

Application software allows you to prepare documents such as text and graphics. It allows you to manipulate data , manage information and format these documents. You can also store the documents and retrieve it at a later date.

poob bn vbyfcfgxfc jghjg jhgh

Answers

Answer:

Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.

Explanation:

A leading global vendor of computer software, hardware for computer, mobile and gaming systems, and
cloud services. Its corporate headquarters is located in Redmond, Washington, and it has offices in more
than 60 countries
Apple
Microsoft
IBM
Global Impact

Answers

Answer:

Microsoft

Explanation:

A ______ error occurs when the program's grammar and punctuation is correct, but something happens to halt the program before it is finished.

1. Runtime
2. Syntax
3. Logical

Answers

Answer:

Logical error

Explanation:

Answer:

Runtime

Explanation:

The program stops execution before the end of the instructions has been reached. It is not due to poor grammar/punctuation which would be a syntax error. A logical error would be due to an error in the programmer's logic but would not cause the program to terminate abnormally. This is also not the case.

RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall

Answers

Answer:

Firewall

Explanation:

The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

Do you guys know a unblocked music player because lite tube is blocked?

Answers

A music player is a software or application which is used to playback music so that a user can play, pause, rewind, fast forward or save his favorite playlist and may even contain lyrics to the song.

With this in mind, there are different music players which are used by many users around the world which includes:

D33zerPand0raYT MusicAppl3 music, etc.

These music players contains various functionalities so each user has a unique experience and can easily make his choice on the type of music player he wants to use.

Please note that your question is considered SPAM so I gave you a general overview so that you would get a better understanding of the concept.

Read more about music players here:

https://brainly.com/question/2456743

Technical security measures like anti-virus (anti-malware), firewalls, and keeping browsers up-to-date will:

Answers

prevent malware from old exploits

Which animation category provides custom animations for objects on the slide?

*it's d. motion paths

Answers

Answer:

d. Motion Paths

Explanation: is correct. post protected

4.2.5 codehs text messages answer

Answers

Answer:

public class TextMessage

{

   private String message;

   private String sender;

   private String receiver;

   

   public TextMessage(String from, String to, String theMessage)

   {

       sender = from;

       receiver = to;

       message = theMessage;

   }

   

   public String toString()

   {

       return sender + " texted " + receiver + ": " + message;

   }

}

List four types of Web browsers

Answers

Answer:

internet explorer safari tor firefox

Explanation:

Read what is in the commets.

Answers

Answer:

I'm a little confused on what you are asking, could you please explain.

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

What would the objective of the game be?
What would the operation of the game be?
What obstacles would your players experience?
What outcomes would you like to see in the game?
What sorts of themes, lessons, or skills would you like to express through your game?
What kind of person do you think would enjoy playing your game?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

a write the result P*=++j where j is 24

Answers

Answer:

ang hrap nmn nyan

Explanation:

poede po

with which type of satellite is there a propagation delay?

Answers

Geostationary satellites have a high propagation delay.

_______________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Answers

Answer:

______HUMAN- COMPUTER INTERACTION_________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Explanation:

HOPE ITS HELP

In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.

Answers

Answer:

polymorphic

Explanation:

An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.

Say you want to reference an object of product in the main class, you can do it the classic way:

Product pd = new Product();

Or you can do it polymorphic, like this:

Product pd = new SpecificProduct();

The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference

A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q?
a. (NOT P) AND (NOT Q).
b. (NOT P) AND Q.c. NOT (P AND Q).d. NOT (P OR Q).

Answers

A NAND gate combines the NOT gate and the AND gate.

For inputs P and Q, the boolean expression for the NAND gate is c. NOT (P AND Q)

The NAND gate means:

NOT AND

Assume the inputs are x and y, then the formula would be:

NOT (x AND y)

In this case, the input variables are P and Q.

So, we replace x and y with P and Q, respectively.

The formula becomes NOT (P AND Q)

Hence, the correct expression is (c)

Read more about NAND gates at:

https://brainly.com/question/11178154

Which is a function of an operating system?.

Answers

Answer:

An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.

Answers

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

https://brainly.com/question/24956493

What do we call any element within a computer program, such as a computer game, which simulated decision-making based on algorithms defined by game designers and programmers?

non-player characters (NPCs)

artificial intelligence (AI)

avatar

roguelikes

Answers

Answer:

AI - Artificial Intelligence

Explanation:

codehs python 4.7.6 Powers of Two
it says I'm wrong because I need

Answers

[tex]\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}[/tex]

[tex]\huge\underline\mathtt\colorbox{cyan}{in attachment}[/tex]

Following are the program to calculate the power of two:

Program Explanation:

Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.

Program:

i=1#holding integer value in i

for i in range(20):#defining a for that starts 1 to 20    

   i = 2 ** i#calculate power of 2 in i variable

   print(i)#print value

Output:

Please find the attached file.  

Learn more:

brainly.com/question/23170807

When you begin designing a program, you work from a ____, a description of what your program should do.

Answers

Answer:

This is usually called a brief (you will also hear this in the design industry, as well as other places)

Other Questions
Besides DNA, this is also duplicated during interphase. Separate 846 into 3 parts so that the second part is twice the first part and the third partis triple the second part.x=1st2x= and32x)= 3(2x) What is the grouping of organisms by their energy source PolinizacinDefinicin: Define electrolysis Which is the worst example of a "calamity"?Spotify not working properlySpotify not working properly A category-5 hurricane slamming into Florida A category-5 hurricane slamming into FloridaMom not washing your favorite hoodieMom not washing your favorite hoodielosing your cellphone How do you calculate the file size of a text file? Write the equation of the line in fully simplified slope-intercept form Can someone help me explain Nvm scheduling in operating systems? Both the mother and father of a son with colorblindness have normal vision. From whom did the son inherit the gene for colorblindness Do copd sufferers die of respiratory causes or other causes? 18. A legislature is at the heart of aO A. oligarchy.B. representative democracy.O C. direct democracy.O D. anarchical provisional Physical and chemical are two types of ______.A. weatheringB. erosionC. landformsD. bodies of water of 4On January 1, 2021, Gundy Enterprises purchases an office building for $195,000,paying $45,000 down and borrowing the remaining $150,000, signing a 8%, 10-year mortgage. Installment payments of $1,819.91 are due at the end of each month,with the first payment due on January 31, 2021.pok2. Complete the first three rows of an amortization schedule. (Do not round intermediatecalculations. Round your final answers to 2 decimal places.)intencesDecrease inDateCash PaidInterestExpenseCarrying Value Carrying Value1/1/2021$ 150,000.001/31/20211,819.91nnnnnnn4040< PrevG25 67of 7Next > a girl runs once around a circular track with a radius of 100m at speed of 10m/s. calculate her displacement If a baseball has a mass of 0.075kg and is traveling with an acceleration of 25 m/s^2. What is the force that the baseball will hit the bat?Thanks in Advance! Kayla states the following about the graph ofy = (x + 5) (x - 5) (x + 3)This equation is 2nd-degree so both arrows will be pointingthe same way.The ends of the equation will both be pointing up since theleading coefficient is positive.Describe in words, in as many ways as you know how, how youwould tell this student whether they were right or wrong. Whichgraph shows the solution to thesystem of linear inequalities?y > 2/3x + 3y < - 1/3x + 2 - x+4 = -14 help me now Please help me with this homework