What are software applications?
lines of code that were written by developers
devices that you insert into the computer
files that are stored on the computer

Answers

Answer 1

Answer:

the person above is correct if i were you id take notes!

Explanation:

Answer 2

Answer:

Only A (Top answer)

Explanation:

Files do not create any software alltogether and devices pluged in are not considered software.


Related Questions

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

define the term software with example​

Answers

Answer:

A software or computer software essentially a type of programs which enable the users to perform some particular specific task or actually used to operate their computer. It essentially directs all of the peripheral devices on the entire computer system- what exactly to do and how exactly to perform a task. A software plays a key role of a mediator between the user and the computer hardware. In the absence of software, a user essentially can’t perform any task on a computer. A software product development company is the one which develops software for the users.

Explanation:

hope it will helpful for you

In computing we generally have two parts, the Hardware which we can feel and touch and the Software which are a set or collection of instructions or commands the computer can understand and executes, We cannot touch it

Examples of softwares are

Excel WindowsiTunesMs Word

Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.

In summary we use programming Languages to write software programme for the computer to execute.

Learn more about softwares :

https://brainly.com/question/1538272

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Answers

Answer:

Message authentication

Explanation:

____________ and Vernier calipers may be used to determine the type and size of the thread to be repaired

Answers

Answer:

thread pinch gauges

Explanation:

You want to kill all process IDs of a specific process with a single command. Which command should you use

Answers

Answer:

killall

Explanation:

What it takes to be a Graphic Designer and your interest
Do you plan to pursue or get certified?
150 words

Answers

Answer:

There are a few key steps to starting a career in graphic design: learn the principles of design, enroll in a graphic design course, practice graphic design tools, work on projects, and build your portfolio. … You will also need to master common graphic design tools, such as Photoshop, Illustrator and InDesign.

This portion of the question is up to you not me "Do you plan to pursue or get certified?"

Types of technology include:

A Specialized machinery

B Medical equipment

C Electronics

D All of those are correct

Pick one please

Answers

All of those are correct
Hopes this helps


Who plays a role in the financial activities of a company?

Answers

The chief financial officer

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler

a virtual network of websites connected by hyperlinks is called

Answers

Answer:

it is called the World wide Web

Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems​

Answers

Answer: A) Primary Storage Media


Explanation:

A computer peripheral is any external device that provides input and output for the computer

The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.

What is a peripheral device?

A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.

Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.

The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.

A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that  option A is correct.

Learn more about peripheral device here:

https://brainly.com/question/21080721

#SPJ2

Define computer software with its importance in computer system​

Answers

Answer:you just answered my question saying can't help you well i can't help you either

Explanation:

Computer software refers to a collection of programs, data, and instructions that enable a computer to perform various tasks and functions.

It includes both operating systems that manage computer resources and application software used for specific tasks like word processing, web browsing, and gaming.

Software is crucial in a computer system as it acts as the bridge between hardware and users, allowing them to interact with the machine effectively.

Without software, computers would be unable to process data, execute commands, or perform any tasks.

It empowers users with a wide range of functionalities, making computers versatile tools for work, entertainment, communication, and problem-solving in various domains of modern life.

Know more about Computer software:

https://brainly.com/question/33933985

#SPJ5

What in a database table is an item of information with some characteristics?

Answers

Answer:

Attributes describe the characteristics or properties of an entity in a database table. An entity in a database table is defined with the ‘fixed’ set of attributes. For example, if we have to define a student entity then we can define it with the set of attributes like roll number, name, course.

Explanation:

CAN I GET BRAINLIEST

PLEASE HELP! WILL MARK AS BRAINLIEST!
JavaScript can be implemented using the _________ HTML tags in a web page.

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the HTML tag

Explanation:

Answer:

statements placed within script tags

Explanation:

your iphone is not configured to allow calls using this mac

Answers

Answer:

Make sure you have an iCloud account and that your computer is logged into that account.

Explanation:

Write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator). Your program should then divide the numerator by the denominator, and display the quotient followed by the remainder.


Hint: If you use division (/) to calculate the quotient, you will need to use int() to remove the decimals. You can also use integer division (// ), which was introduced in Question 10 of Lesson Practice 2.3.


Once you've calculated the quotient, you will need to use modular division (%) to calculate the remainder. Remember to clearly define the data types for all inputs in your code. You may need to use float( ) , int( ), and str( ) in your solution.


float( ): Anything inputted by a user should be transformed into a float — after all, we are accepting ALL positive numbers, integers and those with decimals.


int( ): When you divide the numerator and the divisor using /, make sure that the result is an integer.


str( ): After using modular division, you can transform the quotient and remainder back into strings to display the result in the print() command.

Answers

Answer:

yes

Explanation:

what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Answers

connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.

Cloud providers often charge their customers based on the amount of processing resources used, such as CPU usage. This practice is known as ________.

Answers

Platform as a Service (PaaS)

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

Explanation:

The reason most people refer to "filming" a video on a cell phone camera is that:

A) a smartphone creates film.

B) the video requires a filter.

C) the word is a holdover from when films were made.

D) the video will be converted to a film later.

Answers

Answer: C

Explanation:

obviously cellphones work digitally and do not produce actual film, nor is it likely it will be converted to film from digital (whats the point?)

When a method in the ________ class returns a reference to a field object, it should return a reference to a copy of the field object to prevent security holes.

Answers

stop normalising the american *smart answer*

Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.

Answers

Answer:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

# num 2 #

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

# num 3 #

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

# num 4 #

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

# num 5 #

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

# num 6 #

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

Explanation:

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

See more about python at brainly.com/question/13437928

E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.

Answers

Answer:

Socratic app

Explanation:

it will help you

You can point your router to a DNS server for name resolution simply by configuring the ____ command.

Answers

You can point your router to a DNS server for name resolution simply by configuring the IP name-server command:  IP name-server.

DNS is an abbreviation for domain name system and it refers to a naming database in which internet domain names or website URLs are stored and translated into their respective internet protocol (IP) address.

Hence, a domain name system (DNS) is used to connect a uniform resource locator (URL) or a web address with its internet protocol (IP) address.

In Computer Networking, when an IP name-server command is configured on a router, it enables the user the ability or opportunity to point it to a domain name system (DNS) server for name resolution or translation into an internet protocol (IP) address.

Read more: https://brainly.com/question/17273205

* what is an electronic mail ?

= Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.​

Answers

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

Convert the binary (base-2) number 1110 1001 to decimal (base-10).

Answers

Answer:

233

Explanation:

alright bro, listen. lets do some QUICK MAFFS.

from right to left.. we start from 1, and then double the number. so it would kind of look like this:

128 64 32 16  8 4 2 1

ok so whenever you are converting binary to decimal, make sure you have those numbers underneath the ones and zeroes.

[tex]1 \ \ \ \ \ 1 \ \ 1 \ \ \ 0 \ \ 1 \ 0 \ 0 \ 1\\128 \ 64 \ 32 \ 16 \ \ 8 \ 4 \ 2 \ 1[/tex]

ok so you see how the ones and zeroes are perfectly above the reference we are using?

so each one that has a one, add the number underneath it together

128 + 64 + 32 + 8 + 1

equals 233

LISTEN. STAY AWESOME GAMER!

uploaded ads give advertisers access to more inventory than responsive display ads. true or false?

Answers

Answer:

True

Explanation:

This is because of the fact that  it allows the marketing industry rise to higher rates.

Ture but you can do that for now and then when we can get it done today and then we

It is most commonly used for self-running presentations.
A. Slide Transition
B. Hyperlink
C. Action Buttons
D. Animation​

Answers

Answer:slides

Explanation: because in the slide you can make a presentation

When setting up a project timeline for a computer lab, which of the following should not be taken into consideration?
time to install software
time to set up the network
time to purchase items
time for maintenance

Answers

Answer: It depends on where you are how far the place where you are going to purchase the items and also it depends if your a fast builder or not

but if you are quick it shouldnt take so long just depends on you.

Explanation:

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

ecmascrip is how Javascript can be implemented I think I'm very sry if it's wrong

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

(thanks for all the points)

Other Questions
The Indian groups that lived in the present-day Ohio River Valley and reached their peak from 100 to 400 CE were collectively known as the: Something that serves as a model for others to copy is a Cmo se clasifica el aire? How was Germany often depicted in propaganda posters during World War I?A. as a savage beastB. as a lazy animalC. as a hungry vultureD. as a flying eagle What is the purpose of the red-core yarns in the synthetic sling? What reform was brought about by the 1887 Dawes General Allotment Act?. 1. What's the main reason our culture has normalized credit cards over the past 60 years? What can we do to change the normalization of debt in the future? Please help!! I will mark brainliest with full detailed answer!! 10a) Beatrice has an income of $40 000 in one year.She pays no tax on the first $10 000 of her income;10% tax on the next $10 000 of her income;25% tax on the rest of her income.Calculate:a) the total amount of tax Beatrice pays,b)the total amount of tax as a percentage of the $40 000.10b) Beatrice pays a yearly rent of $10 800.After she has paid her tax, rent and bills, she has $12 000.Calculate how much Beatrice spends on bills. Camila ubic 90 botellas en una estantera de un supermercado y de ellas eran de jugo sin azcar.Si los jugos sin azcar tienen tres sabores diferentes y Camila puso la misma cantidad de cada sabor en la estantera, con cul de las siguientes operaciones se calcula la cantidad de botellas de jugo sin azcar de cada sabor que puso Camila en la estantera? what should Lisa carry with her when she attends the workshop Each of the following sets of quantum numbers is supposed to specify an orbital. Which of the following sets of quantum numbers contains an error?A) n = 2, l = 1 , ml = -1B) n = 4, l = 2, ml =0C) n = 3, l =3 , ml = -2D) n = 1, l = 0, ml =0E) n = 3, l = 0, ml =0 The father asked his son for a hug.The possessive pronoun in this sentence is "his."What is the antecedent for his?A:TheB:HugC:FatherD:Asked How do I rewrite the following expression is there a form 1/4 (4x+8) please help me its gonna help my grade Which statement best synthesizes information from both sources?A. Experts disagree about whether online writing has helped or hurtstudents' writing skills overall.B. Most people agree that smiley faces do not belong in formalwritingC. The Internet has given students much more writing practice thanbefore.D. Kenji Nakamura only compared expressions that students usedand did not concentrate on their ideas. Fill in the blank with a number to make the expression a perfect square. y^2 + 6y + ? Who spread islam thoughout africa ? someone please help me i'll mark brainliest How does collision theory relate temperature to the rate of a reaction? Mr. quick bought new computer system. The regular price was 1,580 , but he got a 15% discount. How much did he actually pay?