Which is not an explanation of icons?

A) pictorial, onscreen representations
B) they symbolize computer actions that users may select using a mouse, keyboard, lightpen, or joystick
C) they serve functions similar to those of words
D) they may replace functions in many menus
E) meaning of icons is less quickly grasped than words


E) meaning of icons is less quickly grasped than words

Computer Science & Information Technology

You might also like to view...

Match each term with the correct statement below.

A. used to test the voltage on a network cable. B. device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information. C. can be used to verify that a DNS is server is online and working. D. can be used to monitor server components such as hard disks, memory, and the processor. E. can detect many forms of network traffic and capture packets and frames for analysis F. provides network management services through agents and management systems. G. backs up all files, files that have changed by date, or files that have changed after the previous backup. H. used by Performance Monitor when there are two or more types of elements to monitor such as two or more NICs or disk drives I. a specific situation or event detected by SNMP that a network administrator may want to be warned about

Computer Science & Information Technology

In the code below, why is it that the displayName() module cannot print the person's name?Start   Call getInput()   Call displayName()StopModule getInput()   Declare String name   Display "Enter your name: "   Input nameEnd ModuleModule displayName()   Display "Your name is: " + nameEnd Module

A. The name variable is outside the displayName() module's scope. B. The name variable is a global variable. C. The name variable is strongly cohesive. D. The name variable has high coupling.

Computer Science & Information Technology

Which formula would you use to arrive at the number of hosts on a subnet?

A. 2x + 2, where x represents the number of zeroes in the subnet mask B. 2x - 2, where x represents the number of zeroes in the subnet mask C. 2x / 2, where x represents the number of zeroes in the subnet mask D. 2x * 2, where x represents the number of zeroes in the subnet mask

Computer Science & Information Technology

Which of the following options allows you to gain access to the BIOS configuration when an unknown password prevents such access?

A) Repositioning a jumper on the motherboard to clear the CMOS memory B) Holding down a BIOS-specific key or key sequence while booting the machine C) Unplugging the computer for at least 2 minutes D) Pressing F8 early in the boot sequence and selecting the option to clear the password from the resulting menu

Computer Science & Information Technology