answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
2 years ago
10

Frequent menu users can become annoyed if they must make several menu selections to complete a simple task. Suggest two ways you

can refine the menu approach to accommodate expert or frequent users. (at least 2-3 sentences describing each way)
Computers and Technology
1 answer:
eimsori [14]2 years ago
5 0

Answer:

to refine the menu approach

1. Provide hotkeys for frequently accessed menu items.

2. Allow advanced users to customize a quick access bar to allow them to quickly access a more frequently used item.

Explanation:

1. Shortcut keys (Hot keys) provide a method for users to activate frequently used menu items in your menu system and to provide keyboard access to your application for those users who do not.

2. The Quick Access Toolbar (or QAT) allows you to create an easily accessible group of shortcuts to the tools you use most frequently.

You might be interested in
Write an if-else statement to describe an integer. Print "Positive even number" if isEven and is Positive are both true. Print "
Nina [5.8K]

Answer:

C code explained below

Explanation:

#include <stdio.h>

#include <stdbool.h>

int main(void) {

int userNum;

bool isPositive;

bool isEven;

scanf("%d", &userNum);

isPositive = (userNum > 0);

isEven = ((userNum % 2) == 0);

if(isPositive && isEven){

  printf("Positive even number");

}

else if(isPositive && !isEven){

  printf("Positive number");

}

else{

  printf("Not a positive number");

}

printf("\n");

return 0;

}

6 0
2 years ago
This subsystem defines the logical structure of the database by using a data dictionary or schema. multiple choice data manipula
zubka84 [21]
Data manipulation subsystem<span>provides tools for maintaining and analyzing data
</span>Application generation subsystem<span>provides tools to create data entry forms and specialized programming languages that combine with common and widely used programming languages
</span>Data administration subsystem<span>helps supervise the overall database; including maintenance of security, supplying disaster recovery support, and observing the overall performance of database operations</span>
7 0
2 years ago
Read 2 more answers
NEED ASAP!!
kow [346]

Answer:

because he needs to connect them all to the sane network (i think)

4 0
2 years ago
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
2 years ago
Why is it important to set a strict password policy as part of your security template?
kari74 [83]
So that its well secured and not misused by unauthorized persons
6 0
2 years ago
Other questions:
  • Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
    13·1 answer
  • A ____ partition contains the data necessary to restore a hard drive back to its state at the time the computer was purchased an
    8·2 answers
  • Write pseudocode for a program which will ask a user to enter two numbers a and b. It then asks what operation is to be performe
    14·1 answer
  • When trying to improve performance of a slow system, you notice in Task Manager that the superfetch service is using a high perc
    11·1 answer
  • What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where woul
    15·1 answer
  • Consider the relation Courses(C, T, H, R, S, G), whose attributes can be thought of informally as course (C), teacher (T), hour
    10·1 answer
  • Alex is nearing graduation. His counselor showed him this information. Alex's College Costs &amp; Payment Options per Year Costs
    5·2 answers
  • Stan’s assignment is to print a three-dimensional image on a piece of paper. Which printing technique should he use?
    14·2 answers
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
  • Choose the person responsible for each innovation.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!