Graphical User Interface (GUI)

21st December 2020 | Cybrary Graphical User Interface (GUI)


GUI Desktop Environments

A Graphical User Interface (GUI), often pronounced ‘gooey’, is a user interface that includes graphical elements, such as windows, icons, and buttons. The term was created in the 1970s to distinguish graphical interfaces from text-based ones, such as command-line interfaces. However, today nearly all digital interfaces are GUIs.

For several years, GUIs were controlled only by a mouse and a keyboard. These types of input devices are perfect for desktop computers but don’t work as well for mobile devices, such as smartphones and tablets. Due to this, mobile OS is designed to use a touchscreen interface. A mobile OS, like Apple’s iOS, adds larger icons and supports touch commands like swiping and pinching to zoom in or zoom out. Automotive interfaces are often designed to be controlled with knobs and buttons, and TV interfaces are built to work with remote controls. Regardless of the type of input, each of these interfaces is considered GUIs since they include graphical elements.

Source: TechTerms

Additional Reading: Software Developed to Help Programmers Prototype Graphic User Interfaces

Related Terms: Application Programming Interface (API), Human-Machine Interface (HMI)

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more