Helppppppp pleaseeeewweeweee

Helppppppp Pleaseeeewweeweee

Answers

Answer 1

Answer:

D

Explanation:

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets


Related Questions

E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.

Answers

Answer:

Socratic app

Explanation:

it will help you

Time shifting occurs when _______. A. Clocks move ahead one hour in the spring b. Works are copied and kept for future generations c. Individuals copy works to view at a later time d. Copyrighted materials comes into the public domain.

Answers

Answer:

c. Individuals copy works to view at a later time

Explanation:

Time Shifting: Recording a program to a storage medium to be consumed at a later date.

Time shifting occurs when Individuals copy works to view at a later time. The correct option is c.

What is time shifting?

As the name implies, time shifting is the shifting of a signal in time. This is accomplished by adding or subtracting a shift quantity from the time variable in the function.

Time shifting or Shifting a signal in time means that the signal is either delayed or advanced in the time axis.

Other space shifting processes include time shifting, which involves recording a radio broadcast and listening to it later, and format shifting, which involves converting a media file into a different format.

You can watch a show at separate moments of the day by changing the time. When people copy works to view later, they are time shifting.

Thus, the correct option is c.

For more details regarding time shifting, visit:

https://brainly.com/question/11563105

#SPJ5

The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files.

Answers

Data is known to have cache. The data cache is where the data read from the database data files are stored after the data have been read or before the data are written to the database data files.

Cached data are simply called too be the information that is saved on one's computer or mobile devices after a person have visited or accessed a website.

A lot of Developers often make use of cached data to boast their online experience. A considerable number of consumers often want a website to load within two and three seconds.

Learn more from

https://brainly.com/question/23708299

What kind is a utility file that shrinks the size of a file

Answers

Answer: Compression

Explanation:

What is a megavirus in computing

Answers

In the lab experiments conducted by Professor Claverie and colleagues, in which they infected fresh-water amoebas, Megavirus was seen to construct large trojan organelles - the "cells within cells" that would produce new viruses to infect other amoebas.

web browsers save website information in their _________, which helps the site load faster on future visits.

Answers

Answer: cache

Explanation:because I took the quiz

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

Usually a ________ in Java code indicates the end of a data structure. Group of answer choices backslash character forward slash character null reference null pointer

Answers

Answer:

null reference.

Explanation:

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

What is disadvantages of disk maintenance

Answers

Answer:

The torque generated on the axle (for a normal rear mounted disk caliper) is down - the same direction as the dropouts.

one big disadvantage of disks is that has yet been mentioned is their ability to eject the front wheel when using a tradition QR axle.

Explanation:

CAN I GET BRAINLIST

why is it necessary to have a w-2 or 1099 form when using tax preparation software?

Answers

The reason why it is necessary to have a w-2 or 1099 form when using tax preparation software is to:

Allow the software engineer to report his income

According to the given question, we are asked to show the reason why it is necessary to have a W-2 or 1099 form when a software engineer is preparing software.

As a result of this, we can see that these two forms are both used by the Internal Revenue Service so that individuals such as the software engineer can report their income and make their tax payments.

Read more here:

https://brainly.com/question/24749083

A backup utility can ensure that data is not lost if your computer or disk drive
fails. *
True or false

Answers

false




have a good day

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

Answers

Answer:

In the context of data-flow diagrams (DFDs), a(n) entity symbol shows either the source or destination of the data

Explanation:

WILL GIVE A BRAINLIEST!!! PLS HELP!!!






We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give, never gonna give

(Give you up)

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

I just wanna tell you how I'm feeling

Gotta make you understand

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

URGENT We use HTML5 in lightweight web pages which load faster and put less strain on web servers.

A. True
B. False

Answers

Answer:

A. true i think?

Explanation:

im not sure but i hope it help

* what is an electronic mail ?

= Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.​

Answers

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

Which career path involves working directly with computer networks?

Answers

The career path involves working directly with computer networks are analyst, network manager, and data analyst.

What are Networking?

Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.

Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.

Read more about the networking :

https://brainly.com/question/1027666

#SPJ1

Answer: Computer systems administrator

Explanation:

What is the role of a control in a system that is functioning correctly

Answers

A control system manages, commands, directs, or regulates the behavior of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large industrial control systems which are used for controlling processes or machines.

What is monitor ?why it is necessary for computer system ?​

Answers

Answer:

Monitor is an output device that displays information in pictorial or text form. A monitor usually comprises a visual display, some circuitry, a casing, and a power supply.

 It is important as it allows for proactive response, data security and data gathering and the overall good health of a computer system.

what is draft pls help me​

Answers

Answer:

draft like as a rough draft it pretty much a set were you can play and the do the real thing

Drafting refers to actually writing the words of the paper. As part of the writing process, you will write multiple drafts of your paper. Each rough draft improves upon the previous one. The final draft is simply the last draft that you submit.

GUI STANDS FOR__________________

Answers

Explanation:

A graphizaluser interface (GUI) is a type of user interface through which users interact with electronic devices via visual indicator representations.

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity

Answers

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

help me i'll brainiest if its right

Answers

Answer:

Your response is correct.

I hope this helped at all.

Answer:A

Explanation: by limiting the amount of thermal energy that flows  out of the drink keeps it nice and taste :D

The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer:

cyber security I think that is what it is

Explanation:

m

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.

WILL GIVE A BRAINLIEST!!! PLS HELP!!!




We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

never gonna give you uppp

Explanation:

criiiiii

1. What are the electronic hand tools presented in the video? 2. How many cleaning materials where used to maintain the tools? 3. Enumerate the steps in maintaining the hand tools presented in the video clip.

Answers

I don't think you can answer the question without a video

What security feature on a smartphone prevents the device from being used until a passcode is entered?

Answers

Answer:

Lock Screen

Explanation:

Define cyber law with its area ​

Answers

Answer:

Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements

Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.

in database systems, a table is also known as a _____.

Answers

Answer:

a relation

Explanation:

In database systems, a table is also known as a file.

What do you mean by database systems?

A database is a structured collection of data that is stored and retrieved electronically in computing. Small databases can be kept on a file system, whereas large databases are kept on computer clusters or in the cloud. Database design encompasses both formal techniques and practical factors, such as data modelling, efficient data representation and storage, query languages, sensitive data protection and privacy, and distributed computing issues such as concurrent access and fault tolerance. To gather and analyse data, a database management system (DBMS) is the software that communicates with the end users, applications, as well as the database itself.

One of the various types of the system object type *FILE is a database file. A database file provides specifications of how input data from internal storage is to be presented to a programme and how output data from a programme is to be presented to internal storage.

To learn more about database systems
https://brainly.com/question/28481695

#SPJ2

Coordination in a global information system requires a _____ architecture for data, standardization within departments.

Answers

Coordination in a global information system requires a decentralized architecture for data, standardization within departments

Other Questions
Answer this riddle to get Brainliest! The more there is, the less you see. What am I? Name 5 considerations the president must take when picking the cabinet HELPPPP PLS!! TYLook at triangle ABC. Coordinate grid shows negative 5 to positive 5 on the x axis and y axis at intervals of 1. A triangle ABC is shown with A at ordered pair 4, 5, B at ordered pair 1, 2, and C at ordered pair 4, 2. What is the length of side AB of the triangle? (1 point) Square root of 6 3 Square root of 18 6 a blank is a path of connected jobs that all work together to help you develop your skills and experience in one particular areaa. life choiceb. careerc. pland. specialty Someone help, please. Thank youAlso, enter your answer in scientific notation Which event is most clearly the climax of "The Monkey's Paw"? What are the duties and terms of service of executives? why it is important to base scientific theories and models on empirical evidence as opposed to other ways of knowing such as religion Which exercise's can increase your heart rate. What is the perimeter of this arrangement? A comparison that uses "like" or "as" is known as what?Question 6 options:1. A simile2. An idiom3. A metaphor4. An expression Choose the correct form of the verb "maigrir" for the following sentence:Claudine et Paulquand ils font beaucoup de sport.O maigrontO maigrentmaigritmaigrissent please help me with this 2 Is 150% of a number greater than or less than the number?. Help due in 40 minutes How does Lexies current interview technique limit her effectiveness as an interviewer Temperature is a measure of ___________A: Heat Energy B: Potential Energy C: Climate D: Kinetic Energy heyyy can anyone write me a poem (any topic) with 20 lines that has allitelaration , internal rhyme and metaphor. THANK YOUU Given f(x) = x 7 and g(x) = x2. Find g(f(4)). G(f(4)) =. Please help ill mark brainlyst please