In 1981, the first digital icons were launched for users in _________, which was the first computer with a GUI operating system.

Answers

Answer 1

Answer:

Xerox Alto

Explanation:

the first digital icons were launched for users in Xerox Alto in 1981. this was the first computer with a General user interface (GUI) operating system. It had a speed designation of 3 Mbit/s.

The xerox Alto had a huge influence in the design of personal computers in decades to come. It was the first to bring together all of the components of the GUI.

Answer 2

In 1981, the first digital icons were launched for users Xerox Alto which was the first computer with a GUI operating system.

It should be noted that the first digital icons that was launched is Xerox Alto in 1981. It was simply the first computer that had a general user interface operating system.

Also, Xerox Alto had a speed designation of 3 Mbit/s and had a huge influence in the design of personal computers in decades to come.

Read related link on:

https://brainly.com/question/21728252


Related Questions

Question # 3
Multiple Choice
What is the next line?

>>> grades = {100:'A', 75:'C', 89:'B', 80:'B'}
>>> grades[75]


1

2

'A'

'C'

Answers

Answer:

C is it

Explanation:

Answer:

its the 4th option 'C'

Explanation:

Changing the position of text on the screen is called ________.

Answers

Answer:

Formatting

Explanation:

Hope this helps

Think of a simple software project that requires your design skills. Specify the requirements needed on each design process

Answers

Answer:In this guide, we'll go over the basics of your software development ... I know which option I'd choose. ... Will you need to integrate with other tools or APIs? ... With the requirements in place, it's time to start designing what this ... In its most basic form, you can think of the Waterfall method as following each ...

Explanation:

These comprise fundamental elements such as the functions, features, and requirements, which are chosen after analysing user demands. Hardware and software specifications, maintainability, availability, and testability are a few design criteria.

What requirements needed on each design process?

Design specifications specify the conditions that a new good or service must fulfil to be deemed successful. In order for your team to design, create, and assess your solution, it is crucial to identify these requirements in the beginning.

Therefore, Criteria are the requirements that the design must meet in order to succeed. The design is limited by constraints. These could include the materials on hand, the cost of the supplies, the time allotted for developing the solution, etc.

Learn more about design process here:

https://brainly.com/question/28221020

#SPJ2

What is the correct sequence of steps in converting application data to bits for network transmission on a TCP/IP network

Answers

Answer:

1. Application data

2. segments

3. packets

4. frames

5. bits

Explanation:

The correct sequence of steps in converting application data to bits for network transmission on a TCP/IP network is as follows:

1. Application data: the conversion and formatting of information into data is done in Upper layers then moved to Transport Layer.

2. segments: at this stage, the data is turned into segments and then moved to the Network layer.

3. packets: at this point, the segment is transformed into packets and then moved to the Data Link layer

4. frames: here the packets are converted to frames and moved to the physical layer.

5. bits: this is where the frames are converted bits and then sent to the network outlet.

Which two components are configured via software in order for a PC to participate in a network environment

Answers

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

Samantha wants to find out movie time for the new movie puppy save the world at her local theater which keyboard should Samantha use
Movie theater plus near
Movie theater plus near plus puppy save the world plus time
Puppy saves the world plus time
Puppy saves the world movie

Answers

Answer:

Movie theater plus near plus puppy save the world plus time

Explanation:

Answer:

Movie theater +near +Puppy Saves the World +time

Explanation:

These are four important key details that should be included when looking for something specific such as going to see a movie

A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output is the miles walked.

Answers

Answer:

The program in Python is as follows:

steps = int(input("Steps: "))

miles= steps/2000

print("Miles: "+str(miles))

Explanation:

This prompts the user for number of steps

steps = int(input("Steps: "))

This calculates the miles walked

miles= steps/2000

This prints the calculated miles

print("Miles: "+str(miles))

Disney's first cartoon

Answers

Answer:

Mickey Mouse

Explanation:

Answer:

Oswald the Lucky Rabbit \(⋅⃘﹎᷊⋅⃘)

Explanation:

Oswald the Lucky Rabbit (also known as Oswald the Rabbit or Oswald Rabbit) is a cartoon character created in 1927 by Walt Disney and Ub Iwerks for Universal Pictures. He starred in several animated short films released to theaters from 1927 to 1938. 27 animated Oswald shorts were produced at the Walt Disney Studio.

i'll give brainliest to whoever says Tom Clancy's: The Division 2 is a garbage game.

Answers

Tom Clancy the division 2 is garbage.

What is abstraction and how does it relate to how computers store information?

Answers

Answer:

Definition - What does Abstraction mean?

Abstraction is a fundamental principle in some types of computer science. It is a key design aspect of object-oriented programming languages and application programming interfaces. It's also one of the least understood ideas in programming, partially for semantic reasons.

PLEASE MARK BRAINLIEST

Abstraction is commonly defined as the extraction of relevant information from a larger data set, where utilizing abstraction allows engineers and others to simplify a codebase.

Techopedia explains Abstraction

The reason this is confusing to many people is that abstraction doesn't “sound like” what it is, semantically. It sounds like making something more vague, because that's how we use it in general language.

However, in computer science, abstraction typically means simplification and separating the signal from the noise in order to make programming more efficient and effective.

Explanation:

The guy is right above me mark him brainiest

how has State-terrorism done for us and how we can prepare for it?

Answers

Answer:

Developing a plan that prepares not just one family but their whole community.

Explanation:

I think a great way to  prepare for  state-terrorism is by developing a disaster awareness plan. An event that hosts  first-responders, medics, policemen, etc. To speak over these circumstances in the event, there are many possibilities with a disaster awareness event, activities for the younger ages that teach kids to be "prepared not scared" this event can go a lot farther than state-terroism a step further would be to prepare people for natural disasters that can occur, and the ways to prepare for this.

Create a program to determine the largest and smallest number out of 15 numbers entered (numbers entered one at a time). This should be done in a function using this prototype: double larger (double x, double y); Make sure you use a for loop expression inside your function.

Answers

Answer:

Create a program to determine the largest and smallest number out of 15

Explanation:

 #include <iostream>

using namespace std;

double larger (double, double);

int main()

{

double max, num;

cout<<"Please, enter 15 numbers, one at a time, and the program will return the largest number.\n";

cout<<"Enter the first number: ";

cin>>"max";

for(int i=1; i<=14; i++)

{

cout<<"\nEnter another number: ";

cin>>"num";

max=larger(max,num);

}

cout<<"The largest number is: "<<larger;

return 0;

}

double larger (double x, double y)

{

if(x>y)

return x;

else return y;

}

What is the value of the count variable after the execution of the code snippet below? ArrayList somenum = new ArrayList(); somenum.add(1); somenum.add(2); somenum.add(1); int count = 0; for (int index = 0; index < somenum.size(); index++) { if (somenum.get(index) % 2 == 0) { count++; } }

Answers

Answer:

The answer is "1".

Explanation:

The value of the count variable after the code snippet execution is 1 because we're using three in the array list, instead, take one of these for a loop of 0 to the array list size but now the ArrayList size is 3, as well as the loop size, operates from 0 to 2:

In the index =0:

We get somenum.get(index)=somenum.get(0)=1%2 not 0, so we go on to the next index.

Index: = 1

We get a somenum.get(index) =somenum.get(1) = two percent 2 comparable to 0, so the count variable is increased to 1 and switch to just the following index.

count=1  

Index: = 2

They have a somenum.get(index) = somenum.get(2)=1 percent 2 not equivalent to 0.

Index= 3:

The index =3 <somenum.size()=3.

It isn't valid, and the loop breaks out and prints out the value of a count variable which is 1. so this becomes 3 < 3.

using a timer to generate a random number, develop a program that displays random numbers between 1 and 47 (or whatever) for your state's lottery

Answers

Answer:

Explanation:

The following code is written in Python. It creates a variable that detects the current time. Then it loops through a range of numbers and chooses the last random number after 2 seconds. Finally, it prints that number to the screen. This function can be called countless times depending on the number of state lottery numbers needed.

import random

import time

start_time = time.time()

while time.time() - start_time < 2:

   lottery_number = random.randint(0, 48)

print(lottery_number)

Your network administrator asked you to change the IP for your first NIC to 206.206.206.138 so that users on the internet can reach the website you developed. What company do you work for

Answers

Answer:

Arizona State University

Explanation:

Internet Protocol address is a numerical means of identification assigned to each computer system that has access to the internet. It serves the function of identifying and communicating with other networks when connected to the internet.

When packets of information are exchanged over the internet, the incoming data contains a header which bears the internet protocol address of the sender as well as that of the receiver. The internet protocol address, 206.206.206.138, unique to Arizona State University.

write one for loop to print out each element of the list several things. then write another for loop

Answers

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

In the picture below

Answers

Answer:

The answer is "It is a public method in the Car class".

Explanation:

In this question, the fourth choice is correct because the accessor method will be public, and the incorrect choice can be defined as follows:

The first and second choice was wrong because the class name is "Car".In the third choice, it is wrong because the method will not be private.In the fifth choice, it is wrong because the object name "mustang".

sin lord is 35k a=ok awesome but i think mythic gem better ok so yeyeyeyeyeyeyeyeye
or no, does somebody know sinister lords value or mythic infinity gem i think sin lord is 35k but what about mythic gem.

Answers

Answer:

sinister lord I'm pretty sure is 35-36k and mythic I'm not sure but i think the shiny value is like 35-34k and dropping and sin is rising, I don't know mythic value but u can check in a value list but sinister lord is rising so yea but if your doing mythic for sin lord L because mythic is worth way more than the shiny gem because its more rare.

Explanation:


Match each command group under Picture Tools to the appropriate tasks.
Adjust
Crop and rotate an image,
Arrange
Position images on a slide,
Size
Modify the shape, border or outline of an
image
Picture Styles
Modify the color and brightness of an image

Answers

Answer:

look at the attachment for correct answers.

The match up of the command group under Picture Tools to the appropriate tasks is given in the image attached.

What are the picture tools?

Picture Tools are known to be tools that are often used to enhance an image. They includes:

BrightnessContrastCompress Pictures, etc.

Conclusively, the use of this tools will make your pictures to be better and attractive to behold.

Learn more about Picture Tools from

https://brainly.com/question/9566501

#SPJ2

Assume that programs spend about 25% of their time waiting for I/O operations to complete. If there are FOUR programs loaded into memory, what is the processor utilization

Answers

Answer:

0.9961

Explanation:

Given that:

Proportion of time waiting for I/O operation to complete = 25% = 0.25

Number of programs waiting in memory = 4

Using the CPU Utilization formula :

CPU Utilization = 1 - p^n

1 - 0.25^4

1 - 0.00390625

0.99609375

Write a function that takes two arguments, both integers, and prints the product. In the main part of your program (the part that isn’t inside a function), call your function to test it out.

Answers

Answer:

def multiply(a, b):

print(a*b)

multiply(2,3)

Explanation:

Using python3 :

The program is written using python 3 ;

def represent the statement used at the start of a function.

Multiply is the name given to our function (it could be any other name of interest)

(a, b) are the argument, which represents the two integers the function takes.

print(a * b) = What the function does is to print the product of a and b

multiply(2,3) is used to test out our function by call the name and Giving  it two integers to work on. The function will print 6

Define and describe PaaS. List the benefits of PaaS solutions. Describe potential disadvantages of PaaS. Describe how a cloud-based database management system differs from an on-site database. List the computing resources normally provided with a PaaS.

Answers

Answer:

PaaS has become a cloud technology that offers a way for consumers just to establish, successfully manage implementations without any of the sophistication of preserving but instead developing the technology related to the development and start-up of apps.

Explanation:

Benefits:

Not no need to purchase hardware as well as raise revenues throughout leisure time. There was no need to consider throughout configurations.

Disadvantages:

These have privacy concerns, during which data security contributes to the problem as well as monitored. These have problems with the portability of implementation.

Difference between Cloud base DBMS and On-site database:

On-site DBMS data couldn't be accessed from just about any location as either a cloud-based management solution.DBMS Cloud base documentation to ensure mostly with highly valued information collected to provide direct exposure to everybody else together whilst on-site DBMS functionalities such as SQL.

Computing recourses:

The architecture of web applications. Prebuilt techniques for developing, managing, and testing applications.

Chantelle wants to change the color scheme for her company's web app, and she needs to get the logos updated. What kind of developer should she talk to

Answers

Incomplete question. The options;

a. Back-end

b. DBA

c. Front-end

d. Mobile

Answer:

c. Front-end

Explanation:

A Front-end developer is skilled at designing the external features of a web application or web browser. In other words, the user interfaces such as the color and logos of an app are designed by the Front-end developer.

Hence, Chantelle should talk to an experienced Front-end developer.

The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router

Answers

Answer:

anti-malware software.

Explanation:

An anti-malware software can be defined as a software application or program designed to avail end users the ability to protect their computer system and other end devices from malicious programs (malwares) such as rootkit, worms, adware, spam, spyware, etc.

Some examples of anti-malware softwares are Avast, Comodo, Kaspersky, Norton, Eset 360 etc.

Hence, the best way to help prevent a system from a worm attack is to use an anti-malware software.

Basically, anti-malware software has some inbuilt techniques such as sandboxing, behavior monitoring and malware removal feature designed to help prevent a system from a worm attack and other malicious programs.

Better Control, higher security, and privacy can be achieved through which type of cloud deployment model

Answers

Answer:

Private cloud deployment model

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS)

Also, there are three (3) main cloud computing models and these are;

I. Public cloud deployment model.

II. Hybrid cloud deployment model.

III. Private cloud deployment model.

Hence, better control, higher security, and privacy can be achieved through a private cloud deployment model because it is dedicated solely to the user and void of any public interference.

doubleUp Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size. Suppose a list stores the values [1, 3, 2, 7]. After calling list.doubleUp(), the list should store the values [1, 1, 3, 3, 2, 2, 7, 7].

Answers

Answer:

The solution in Python is as follows:

class myClass:

     def doubleUp(self,myList):

           myList[:0] = myList[::2] = myList[1::2] = myList[:]

       

mylist =  [1, 3, 2, 7]

list = myClass()

list.doubleUp(mylist)

print(mylist)

Explanation:

To create a method in Python, the first step is to create a Class.

This is done in the following line:

class myClass:

Then this line defines the method

     def doubleUp(self,myList):

This line duplicates the elements of the list

           myList[:0] = myList[::2] = myList[1::2] = myList[:]

This defines the list        

mylist =  [1, 3, 2, 7]

This creates an instance of the class

list = myClass()

This passes the list to the doubleUp method

list.doubleUp(mylist)

This prints the duplicated list

print(mylist)

How can you find out which study method is best for you?
O
A. Use the method your friend is using, because if it works for him, it will work for you.
B. Select the first method you try, and do not try anything else.
C. Try two methods, and select the one that seems the best out of the two methods that you have tried.
O D. Try many different methods, and evaluate how effectively they work for you.

Answers

Answer:

d

Explanation:

Answer:

D.

Explanation:

You should always try each one and see which one best fits you.

Write code that outputs variable numDays as follows. End with a newline. If input is 3, output is: Days: 3

Answers

Answer:

In C++:

#include<iostream>

using namespace std;

int main(){

int numDays;

cin>>numDays;

cout<<"Days: "<<numDays<<endl;

return 0;

}

Explanation:

This line declares numDays as integer

int numDays;

This line gets user input for numDays

cin>>numDays;

This line prints the required output and ends with a newline

cout<<"Days: "<<numDays<<endl;

Write a program for determining if a year is a leap year. In the Gregorian calendar system you can check if it is a leaper if it is divisible by 4 but not by 100 unless it is also divisible by 400.

Answers

Answer:

def leap_year_check(year):

return if int(year) % 4 == 0 and (int(year) % 100 != 0 or int(year) % 400 == 0)

Explanation:

The function is named leap_year_check and takes in an argument which is the year which we wish to determine if it's a new year or not.

int ensures the argument is read as an integer and not a float.

The % obtains the value of the remainder after a division exercise. A remainder of 0 means number is divisible by the quotient and a remainder other wise means it is not divisible by the quotient.

If the conditions is met, that is, (the first condition is true and either the second or Third condition is true)

the function leap_year_check returns a boolean ; true and false if otherwise.

var grades = 88;

for(var i=0; i < 100; i++){

grades++;

}
How many times does this loop iterate?

Answers

Answer:

100 times

Explanation:

first value of i in the loop is 0. Last value is 99. So loop never iterates with i at 100.

Other Questions
i need help with this fast Which of the following is an example of strength training?YogaCyclingFootballRunning Help please, Please Help. Which of the following systems of the body interact when a stressful situation causes a person's heart rate to increase and pupils of the eyes to dilate?A.nervous system and excretory systemB.endocrine system and nervous systemC.respiratory system and nervous systemD.nervous system and digestive system Ava planned to paint 5 flowerpots. She painted 4 already. What percentage of her work is complete?O 75%O 80%O 20%O 50% Plz help ASAPThx sm Nobody has helped me all day and I really need this answer please. Will mark brainliest. Find the length of AB. Wendy has a $30 to spend at the store. She wants to buy 5 pairs of socks for $1.99 each and a scarf for $20.49, including tax. She uses rounding to estimate the cost: . Wendy says she has enough money to cover the price of everything. Is she correct? Explain. what did European rulers want during the 1800s. Simplify -3[5 - (-8 + 6)]-21-921 How were the nationalist movements in Nigeria and Kenya similar? Tone is established through _____. what is said and how it is said both of these word choice Explain how the arrangement of short and long sentences in these lines has an impact on the meaning and tone. What is a benefit to having native plants instead of green grass for yards in dry climates? The sun has a mass of 1.99 x 10-30 kg. Saturn has amass of 5.68 x 10^26 kg. The distance between the sunand Saturn is 1.43 x 10^12 m. Calculate the gravitationalforce between the sun and Saturn. 3. Prose makes several key assumptions about the role and impact of reading literary works in high school. What are they What is the variance of returns of a portfolio that produced returns of 20%, 25%, and 30%, respectively What is the difference between an author's purpose and an author's point of view? In a production cost report using process costing, transferred-in costs are similar to: Conversion costs included in beginning inventory. Conversion costs transferred to the next process. Materials costs added at the end of the process. Materials costs added at the beginning of the process. Conversion costs added during the process. If a species has gametes which have 14 chromosomes in them, what is the diploidnumber for that species?o 23O 28O 46O 14