Explain what the dock is and why it is useful

Assignment Help Basic Computer Science
Reference no: EM13998120

For this assignment, you will be exploring the Mac OSX interface. In the process, you will learn the answers to the following questions. Think of this assignment as a scavenger hunt for Mac OSX useful features. If you do not have Mac computer available to you, do not worry. You will still be able to easily complete this assignment after completing the readings and viewing the presentation videos this week.

Answer each of these questions completely and submit your answers in a file named Lastname-U3-Scavenger Hunt.doc following the instructions below.

1.Contextual menus are available through the Mac OSX interface. What keys should you press to make the contextual menu appear?

2.To launch an application, you may begin typing the application name in the ____________ menu bar.

3. You may use Spotlight and Finder to find files on your computer. Let's say that you need to find all files you created as part of your CIS106 class. You know that you included "CIS106" in each file name, but you cannot remember all of the files or where you stored them. Describe how you might conduct that search on your Mac and what utility you would use.

4. Explain what the Dock is and why it is useful.

5. Discuss three of the system preferences you may customize when using a OSX, what settings you would use and why. (20 pts)

6.Describe automatic login and discuss how it impacts security on a computer system.

7. Describe a situation where you believe having the two OSX desktops would be helpful.

Reference no: EM13998120

Questions Cloud

What is the image distance : The actual person (not his or her image) is the object, and the object (person) is behind (outside) the van. The object distance is positive (since it is a real object), and light is traveling from the object (the person), through the lens, and to..
List the steps you can take to protect your privacy : List the steps you can take to protect your privacy and identity when working with databases
Ethics of selling dangerous products : Ethical issues in advertising to children and evaluate the claim that consumers have an obligation to consume in a way that protects the environment
Discuss the role of public policy in shaping policy : Discuss the role of public policy in shaping policy and standards. What role should lawmakers play? Are there examples of recent acts that make it difficult for companies and organizations to do their jobs? What role should lobbying organizations pla..
Explain what the dock is and why it is useful : For this assignment, you will be exploring the Mac OSX interface. In the process, you will learn the answers to the following questions. Think of this assignment as a scavenger hunt for Mac OSX useful features. If you do not have Mac computer avai..
Find position x of sailboat as a function of base variables : As an equation, the magnitude of fk is equal to αv, where v is in meters per second, fk is in newtons, and α is a constant with units of kilograms per second. Assume the sail boat is moving at speed v at some generic time t. These quantities are kn..
A bia determines the extent of the impact : According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples..
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are some ways that company''s can use to get the word

Security awareness programs are their so employees cannot make ignorance an excuse. What are some ways that company's can use to get the word out, and to make sure their employees cannot make that excuse?

  Designing unique game world

Answer the questions listed below under Part A - save your answers into a Word document for submission along with remainder of your assignment. Design your own unique game world, which must exhibit the following characteristics:

  Is there are way to split a large file

Is there are way to split a large file (around 7Gb) without completely reading it. Can we somehow take advantage of the  values stored in the internal map structures?

  Explain a file management system

Explain a file management system, and list and describe five file organizations.

  Explain the importance of user abilities and characteristics

Explain the importance of user abilities and characteristics in the usability of products.

  Write a java program which compiles and executes

Write a Java program which compiles and executes

  Develop a new application system for your business partner

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Design six non-objective compositions that engage

Design six non-objective compositions that engage the elements of line and shape, as well as the principles of design

  Write out that induction proof explicitly

Write out that induction proof explicitly, and also show explicitly how the invariant implies that the greedy satis?ability algorithm is correct.

  What weaknesses in choicepoint information security manageme

Question 1. What weaknesses in ChoicePoint Information Security Management practices likely contributed to their data breach? Please explain how they contributed and what Choice Point could do to strengthen these areas.

  How can you perform table lookup on an array

1. How can you perform table lookup on an array? Your explanation should include one or two practical computing example(s) of table lookup on an array. Are there any alternatives to using an array in your example? 2. What are Arrays 3. What are the t..

  Write a short-term scheduler and observe its properties

The program will take three arguments, a random seed, the name of the algorithm to use, and the length of time to run (in milliseconds).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd