What is the interface of an app?
a storyboard software
the part the user sees
a sketch of your idea
a testing environment

Answers

Answer 1

Explanation:

An application interface or user interface ,is the set of features an application provides so that user may supply input to and recieve output from,the program.


Related Questions

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

The number of swappings needed to sort the number 8, 22, 7, 9, 31 in ascending order, using bubble sort is

Answers

Answer:

3

Explanation:

swap the 7 with the 22

swap the 7 with the 8

swap the 9 with the 22

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as

Answers

Answer: transaction cost

Explanation:

Transaction costs refers to the expenses that are incurred when a good or service is bought or sold. Transaction cost is the labor that's required in bringing a product to the market.

Transaction cost is the costs that are incurred when a firm buys on the marketplace what it cannot make itself.

Transaction costs are the costs that are incurred which don’t accrue to the participant of the transaction.

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

Câu 1: Đất trồng là môi trường?

A. Cung cấp chất dinh dưỡng, ôxy

B. Giúp cây đứng vững

C. Cung cấp chất dinh dưỡng, ôxy, nước

D. Câu B và C

Answers

Answer:

D

Explanation:

What If smart phones / computers didn't exist?

Answers

Answer:

If the smart phones/ computers do not exist we wouldn't be able to communicate with the peoples or with our family members in the case when we are far from them. It has given us acess to : entertainment, family bonding social surrogacy e.t.c. Social interactions would be enhanced, and all the social dramas would not exist as much as it does now. Thus, it has a significant role in our life.

How do you connect asp.Net mvc web application in visual studio 2013 to a database created in mysql query browser

Answers

Solution :

Asp.Net is a programming language of Microsoft. It stands for  Active Server Pages. It was developed by the giant, Microsoft which provides and helps the programmers to build a dynamic web sites, services and applications.

Using the asp.Net we can create a web application which provides interface to the existing database.

Creating an ASP.NET web application :

-- We create a new project in the Visual Studio in the same solution or the new solution and then select asp.NET web app template.

-- Name this project as ContosoSite.

-- Click OK.

-- Now in the project window of a new asp.Net project window, we select the MVC template.

-- Clear the Host in Cloud option as of now as we can deploy the application to the cloud later on.

-- Click ok for creating the application.

Which of the following are characteristics of centralized version control systems? Select 3 options.

A full copy of all project files is stored on each developer's computer.

Changes to the project are stored in a log file on each developer’s computer.

It allows many developers to work on the same project from anywhere at the same time.

Project files are maintained in a central repository.

The process may require file locking, depending on file type.

Answers

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Answer:c d e

Explanation:

how do you underline the selected text?

Answers

Select the text that you want to underline. Tip: You can also use the keyboard shortcut Ctrl+D. Use the Underline style drop-down list to select an underline style. Use the Underline color drop-down list to change the color of the line.

Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).

What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations, graphics, and video clips for the company’s Web site on her or his computer, the computer has begun running slower, especially when performing the graphics functions. The computer needs an increase in VRAM. The computer needs an increase in SRAM. The computer needs an increase in SIMM. The computer needs an increase in RIMM.

Answers

VRAM because VRAM is used for graphic intensive workloads

Answer:

The computer needs an increase in VRAM

It is A


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

A company developed a web application and deployed it on a fleet of EC2 instances that uses Amazon SQS. The requests are saved as messages in the SQS queue, which is configured with the maximum message retention period. However, after thirteen days of operation, the web application suddenly crashed and there are 10,000 unprocessed messages that are still waiting in the queue. Since they developed the application, they can easily resolve the issue but they need to send a communication to the users on the issue. What information should they provide and what will happen to the unprocessed messages?

Answers

Answer: Tell the users that the application will be operational shortly and then all the received requests will be processed when there's a restart of the web application.

Explanation:

After the development of the application, even though the issue can be resolved, a communication needs to be passed across to the users.

The information that should be provided is that the users should be told that the application will be operational shortly after which the received requests will be processed when there's a restart of the web application.

Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them​

Answers

Answer:

answer is i

Explanation:

jjgjnyjghjhkgukhi

Answer:

Encryption is a process by which we can conceal the original message (effectively hiding it)

Explanation:

We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.

Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions

Answers

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

Hence, (b) is correct

CLS
N = 1
FOR J = 1 TO 5
PRINT N
N = 10*N+1
NEXT J
END

Answers

Answer:

1

11

111

1111

11111

Explanation:

Given

The above QBasic code

Required

The output

The iteration on the third line is repeated 5 times; i.e. for values of j from 1 to 5.

In each iteration, the value of N is printed and the next value is calculated.

Initially, the value of N is 1 ---- on line 2

So, 1 is printed first. The next value of N is as follows:

[tex]N = 10 * N + 1[/tex] --- we keep replacing N (on the right-hand side) with current N value.

So, we have:

[tex]N = 10 * 1 + 1 =11[/tex]

[tex]N = 10 * 11 + 1 = 111[/tex]

[tex]N =10 *111+1 = 1111[/tex]

[tex]N =10 *1111+1 = 11111[/tex]

The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

Answers

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

is the process of modifying something to make it fit certain criteria.

Answers

Answer:

Design Process

Angelina has added page numbers to her report, but all of the pages are labeled "Page 1” at the bottom. What caused this issue?
She typed “Page 1” in the footer.
She added a header instead of a footer.
She did not create a numbered list in her footer.
She forgot to click the Continue Numbering option.

Answers

Answer:

She typed "Page 1" in the footer.

Explanation:

This occured because the footer only repeats the same message across the footers unless you enable page numbering.

Hope this helps!

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe

Answers

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

What is the positional weigh of the digit 7 in the octal number 7642 ?​

Answers

Answer:

111 is the answer..i hope it helps

1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.

Which of the following statements about software licensing are true? Select 3 options.

A. Both proprietary and open-source software can be modified and redistributed.

B.Free software does not come with a license.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

E. An end-user license agreement protects both the owner of the software and the purchaser.

Answers

Using software licensing concepts, it is found that the correct options are given by:

A. Both proprietary and open-source software can be modified and redistributed.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

------------------------

A proprietary software is owned by an enterprise(can be both an individual and company) that produced it, while a free software means that anyone can make changes in it.Changes can also be made in a proprietary software, just an authorization from it's owner is needed, and thus, option A is correct.Both types have licenses, and thus, option B is incorrect.Since anyone can change it, in an open-source software the developers can create new software quickly, while proprietary licenses are more restrictive, thus, options C and D are correct.An end-user license agreement protects the owner of the software from it being changed without permission, that is, just the owner, thus option E is incorrect.

A similar problem is given at https://brainly.com/question/14721871

Answer: these are the correct answers

Explanation:

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers

Answers

Answer:

Log inSign up

Server Unit 5 Quiz

STUDY

Flashcards

Learn

Write

Spell

Test

Play

Match

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?

Tap card to see the definition

Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

Tap again to see the term

You want to create policies in a new GPO that affect only computers with Windows 8 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 10 to fall out of the GPO's scope automatically. What can you do?

Tap card to see the definition

Configure a WMI filter on the GPO that specifies Windows 8 as the OS. Link the GPO to the domain.

Tap again to see the term

1/20

Created by

Bannieboy

Tags related to this set

IT Essentials: PC Hardware And Software

Marketing

Right Click

Inheritance

Terms in this set (20)

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are applied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?

Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

You want to create policies in a new GPO that affect only computers with Windows 8 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 10 to fall out of the GPO's scope automatically. What can you do?

Configure a WMI filter on the GPO that specifies Windows 8 as the OS. Link the GPO to the domain.

You have just finished configuring a GPO that modifies several settings on computers in the Operations OU and linked the GPO to the OU. You right-click the Operations OU and click Group Policy Update. You check on a few computers in the Operations department and find that the policies haven't been applied. On one computer, you run gpupdate and find that the policies are applied correctly. What's a likely reason the policies weren't applied to all computers when you tried to update them remotely?

You need to configure the firewall on the computers.

No computers in an OU seem to be getting computer policies from the GPO linked to the OU, but users in the OU are getting user policies from this GPO. Which of the following are possible reasons that computer policies in the GPO aren't affecting the computers? (Choose all that apply.)

-The Computer Configuration settings are disabled.

-The computer accounts have Deny Read permission.

An administrator would like to configure a computer to load policy information that is stored locally to speed system start-up. What client-side feature should the administrator select?

Group Policy caching

A junior administrator deleted a GPO accidentally, but you had backed it up. What should you do to restore the deleted GPO?

Right-click the Group Policy Objects folder and click Manage Backups.

You want to create an HTML report that shows which policies and GPOs are applied to a particular user and computer. Which command should you use?

gpresult

Users who log on from a branch office connected to the DC via a slow WAN link are complaining of slow logon times when you assign applications via group policies. What can you do to speed their logons?

Configure asynchronous processing when a slow link is detected

A finite set of values along with set of rules for permissible operations is called ______


Data type

Class

Methods

Answers

Answer(data type) is your answer

Data type is the correct answer

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

After completing initial diagnostic procedures and allocating system resources, a startup BIOS program checks for information about secondary storage devices that might contain the OS. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility. This option is commonly referred to as a:

Answers

Answer:

Boor sequence

Explanation:

ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antenna should you use on each side of the link

Answers

Answer:

High-gain and directional wireless antenna.

Explanation:

WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. Generally, the standard range or distance covered by WiFi is about 50 meters (160 feet).

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver through the use of an antenna.

In this scenario, you need to implement a wireless network link between two buildings on a college campus, which are 100 meters apart.

A high-gain antenna is an electromagnetic device that typically has a gain rating of 12dBi or sometimes higher. Also, a highly directional antenna can only receive radio signals from a specific direction and it compresses the radio waves that are being transmitted from a sender in to a very narrow beam.

Hence, the two (2) type of wireless antenna you should use on each side of the link are a high-gain antenna and a directional wireless antenna.

Why should a user preview the document before printing?​

Answers

The user should preview a document first to make sure the layout is correct, so as not to waste paper if a font size or layout is incorrect.

Answer:

..........

Explanation:

.................sorry i dont know

Other Questions
The altitude a (in feet) of a plane t minutes after liftoff is given by a = 3400t + 600. How many minutes after liftoff is the plane at an altitude of 21,000 feet What is the sign of 3ay when 2 > 0 and y < 0?Choose 1 answerPositiveNegativeZero Imagine that you're a geographer and an urban planner and you're helping to plan a new shopping mall for your town you discover that most shopping malls exist in areas with large human populations such as in cities and large towns describe how you would use geographies three important questions to help you understand why this happens what is the function of folds and villi A viewfinder has a triangular lens. Some of the measurements of the lens areshown below. Which of the following best represents the length of a?B26a38910ATriangle not drawn to scale If 4 cans of cat food costs $17.20, how many cans of cat food can be purchasedwith $38.70 Why does cube root 7 equal 7 to the 1/3 power Write the expression 4^4(4^-7)(4) using a singleexponent.4^-284^-44^-34^-2 (1) A string of constant thickness and length I cm is stretched by a force of T Newton. A tuning fork stamped 256 Hz sets the string vibrating at its fundamental frequency. Find the frequency of the string when: (i) Its length is doubled and the tension constant; (ii) the tension is doubled and the length constant. 2) State the effect of increase in the tension on a wire on its frequency. Should MacArthur's advice about surrender have been followed? explain .. A train is exactly 24km from Smalltown at 7:00p.m. It travels toward Smalltown at a constant rate of 90km per hour. At what time does the train reach Smalltown? from West Side Story Which line from the play most strongly supports the inference that Ton is conifdent? a) TONY: Just for a minute.." b) "TONY. I'm not 'one of them." c) "TONY: I like him. He will like me." d) "TONY: You see?" Find dy /dx of x - 2x + 5 - 6x Which macromolecule provides a person with most of the energy that is needed for daily activities?carbohydrateslipidsnucleic acidsproteins Identify the five components of fitness. If a and b are parallel and c and d are parallel, which pair of angles are congruent?A. 1 and 16B. 5 and 8C. 9 and 11D. 12 and 13 Please help!!! Much appreciated!! plan a special meal for 6 people anyone please delete my last question In which there is a pic please help what is photosynthesis?? The equation y=2(x-1)^2-5y=2(x1) 2 5y, equals, 2, left parenthesis, x, minus, 1, right parenthesis, squared, minus, 5 is graphed in the xyxyx, y-plane. Which of the following statements about the graph is true?