Graphical user interface; applies computer graphics to make the operating system and program easier to use.
Command-line user interface;Requires the user to type command using key words that tells the operating system what to do.
OR
1. Graphical User Interface
It relates to visual art or of computer graphics
2. Touch-sensitive screen interface
Detect the presence of finger or stylus on the screen.
Works by interrupting matrix of light beams, capacitance changes or ultrasonic reflections.
Githiari answered the question on October 12, 2017 at 15:24
- Explain how the computer configures the system when booting.(Solved)
Explain how the computer configures the system when booting.
Date posted: October 12, 2017. Answers (1)
- Describe five components located inside the system unit(Solved)
Describe five components located inside the system unit
Date posted: October 12, 2017. Answers (1)
- Describe how data is represented in the computer system.(Solved)
Describe how data is represented in the computer system.
Date posted: October 12, 2017. Answers (1)
- Name and describe any two types of database models. (Solved)
Name and describe any two types of database models.
Date posted: October 12, 2017. Answers (1)
- Give three ways in which horticultural farmers can benefit from the use of information and communication Technology (ICT). (Solved)
Give three ways in which horticultural farmers can benefit from the use of information and communication Technology (ICT).
Date posted: October 12, 2017. Answers (1)
- Name and explain the two types of drop caps. (Solved)
Name and explain the two types of drop caps.
Date posted: October 12, 2017. Answers (1)
- State the purpose of each of the types of buses found on the computer motherboard;
Address bus,Control bus
and Data bus(Solved)
State the purpose of each of the types of buses found on the computer motherboard;
Address bus,Control bus
and Data bus
Date posted: October 12, 2017. Answers (1)
- Name two types of buses found on the computer motherboard. (Solved)
Name two types of buses found on the computer motherboard.
Date posted: October 12, 2017. Answers (1)
- A computer user typed the name Kajaido as Kajiado and 8726 as 8126. (a) State the type of each...(Solved)
A computer user typed the name Kajaido as Kajiado and 8726 as 8126.
(a) State the type of each error
(b) Explain how such errors can be controlled
Date posted: October 12, 2017. Answers (1)
- Describe third generation languages and name two examples.(Solved)
Describe third generation languages and name two examples.
Date posted: October 12, 2017. Answers (1)
- Name four toggle keys on a standard computer keyboard. (Solved)
Name four toggle keys on a standard computer keyboard.
Date posted: October 12, 2017. Answers (1)
- Name four approaches that may be used to replace a computerized Information system. (Solved)
Name four approaches that may be used to replace a computerized Information system.
Date posted: October 12, 2017. Answers (1)
- List two uses of computers in meteorology.(Solved)
List two uses of computers in meteorology.
Date posted: October 12, 2017. Answers (1)
- With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer. (Solved)
With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer.
Date posted: October 12, 2017. Answers (1)
- Give three reasons why system maintenance phase is necessary in SDLC. (Solved)
Give three reasons why system maintenance phase is necessary in SDLC.
Date posted: October 12, 2017. Answers (1)
- State three standard coding schemes used in data representation. (Solved)
State three standard coding schemes used in data representation.
Date posted: October 12, 2017. Answers (1)
- State two characteristics of a computer that is infected by computer viruses(Solved)
State two characteristics of a computer that is infected by computer viruses
Date posted: October 12, 2017. Answers (1)
- State three characteristics of a suitable password. (Solved)
State three characteristics of a suitable password.
Date posted: October 12, 2017. Answers (1)
- Explain how data in a computer system is secured using (i) Password; ...(Solved)
Explain how data in a computer system is secured using:
(i) Password
(ii) User access level
Date posted: October 12, 2017. Answers (1)
- The following are some of the phases in the Systems Development Life Cycle (SDLC): system analysis, system design, system implementation, system review and...(Solved)
The following are some of the phases in the Systems Development Life Cycle (SDLC): system analysis, system design, system implementation, system review and maintenance. State four activities that are carried out during the system implementation phase.
Date posted: October 12, 2017. Answers (1)