You interact with a program through its user ______.

A. protocol
B. development unit
C. input window
D. interface


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is a method you can use to stop the spread of a virus?

A) If there are backup devices connected to the infected machine, disconnect them. B) If the infection is on a subnetwork, immediately disconnect that subnetwork. C) If there are servers with sensitive data that are connected to the infected machine, disconnect those servers. D) All of the above

Computer Science & Information Technology

________ are computers that provide simultaneous services like Internet, email, and printers to numerous computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

All of the information that someone can find out about you by searching the web is called your ________

A) avatar B) folksonomy C) tagged information D) digital footprint

Computer Science & Information Technology

What is the Globally Unique Identifier Partition Table (GUID)?

What will be an ideal response?

Computer Science & Information Technology