Group of programs are software ​

Answers

Answer 1

Answer:

No

Explanation:

a single program or application is a software

Answer 2

Answer:

False

Software categories are groups of software. They allow software to be understood in terms of those categories, instead of the particularities of each package.


Related Questions

Binary 10110 into oct & hex Binary 10001 into oct & hex with full process​

Answers

Answer:

yes binary 10001into oct hex with full process.

of the following occupations, which is predicted to have the greatest job growth?

Answers

Answer:

"Web designer" is the appropriate answer.

Explanation:

If we follow the market pattern, the number of purchases made by online shopping will continue to rise from 2002 to 2018 as well as the times to obtain no indication of slowing or stopping. Because of the same, web designers are expected to have the greatest increase in jobs, as it is very important to customize the website so that online customers can appear more interactive.

So that the above is the correct answer.

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

how to delete audio from powerpoint​

Answers

Answer:

To delete an audio clip, select the audio icon on the slide and press Delete.

Hope it helps!!!!

can anyone please help me with this

Answers

Answer:

This should do it. I assume the alignment of the numbers is not important?

<!DOCTYPE html>

<html>

<head>

<style>

table {

 border-collapse: collapse;

 font: 15px Verdana;

 font-weight: bold;

}

table, td {

 border: 1px solid black;

}

td {

 width: 80px;

 height: 80px;

 text-align: center;

}

</style>

</head>

<body>

<table>

 <tr>

   <td>1</td>

   <td>2</td>

   <td>3</td>

   <td>4</td>

 </tr>

 <tr>

   <td colspan="2">5</td>

   <td>6</td>

   <td rowspan="2">7</td>

 </tr>

 <tr>

   <td>8</td>

   <td>9</td>

   <td>10</td>

 </tr>

</table>

</body>

</html>

If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
O water
O silicon
O dust
O energy

Answers

Answer:

Dust!

Explanation:

its the one that makes the most sense to me :)

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:

¿Cuál es la ventaja principal de una tabla dinámica?

Answers

Explanation:

Ventajas de las tablas dinámicas de Excel:

Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?

Answers

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.

Which of the following BEST describes Information Technology (IT)?
IT refers to everything that involves computers.
IT deals with how to turn information into meaningful decisions.
IT has to do with collecting and utilizing data.
IT refers to designing, creating, and improving software.

Answers

Answer:

The correct option is;

IT refers to everything that involves computers

Explanation:

Information technology (IT) are technology related to computing or computing systems

Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.

What is ADO.net????????​

Answers

Answer:

ADO.NET stands for ActiveX Data Object is a database access technology created by Microsoft as part of its .NET framework that can access any ...

Developer: Microsoft Corporation

Which is the correct html for creating a hyperlink pls answer

Answers

Answer:

c

Explanation:

The correct HTML for creating a hyperlink is <a>http://www.w3c.org</a>. The correct option is c.

What is a hyperlink?

The coding that organizes a web page's content is called HTML (HyperText Markup Language). Content may be organized using paragraphs, a list of bulleted points, graphics, and data tables, among other options.

A hyperlink in computers, or simply a link, is a digital pointer to information that the user can follow or be directed by tapping or clicking. A hyperlink directs readers to either the entire document or a specific section within it. Text having links is known as hypertext. An anchor text is a text from which a link is made.

Therefore, the correct option is c. <a>http://www.w3c.org</a>.

To learn more about hyperlinks, refer to the link:

https://brainly.com/question/9483034

#SPJ2

100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate

Answers

Answer:

The two factors are:

The default gateway The routers

Explanation:

Default gateway:

The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.

The routers:

A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.

The Blue Screen of death is not an common error, and it is highly likely that you have encountered and fixed several already. Discuss errors you have come across, and the troubleshooting steps that you took to resolve the problem.

Answers

Answer:

your anwser is B

Explanation:

define data and user with example​

Answers

Answer:

Any data the user creates or owns. The term user data may be used to emphasize that the data were created and owned by the user. For example, when deleting an application, an uninstall program may ask if user data is also to be deleted.

Explanation:

Hope this helps you. Have a nice day^_^

write any four characteristics of desktop computer​

Answers

The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly. Computers work at an incredible speed. A powerful computer is capable of performing about 3-4 million simple instructions per second

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

Declare an array of int values westboundHollandTunnelTraffic that can store the number of vehicles going westbound through the Holland Tunnel - on a particular hour (numbered 0 through 23) - on a particular day (numbered 0 through 6) - on a particular week (numbered 0 through 51) - over the last ten years (numbered 0 through 9). The innermost dimension should be years, with the next being weeks, and so on.

Answers

Answer:

Following are the declaration of the array:

int westboundHollandTunnelTraffic [10] [52] [7] [24];  //defining an integer array  that holds days, week, hour, and year value

Explanation:

In the above-given code, an array that's name is " westboundHollandTunnelTraffic " is declared and the type of the storing elements in the array is an integer.

In this array, it first stores the year's value, and in second, it stores week values, in third, it stores day value, and the last it stores hours value.    

Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE

Answers

Answer:

USB

Explanation:

it is a standard cable connection for consumers electronics devices.

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.

Answers

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

Answer:Input : n = 2, number = 7

Output : 728

There are nine n digit numbers that

are divisible by 7. Numbers are 14+  

21 + 28 + 35 + 42 + 49 + .... + 97.

Input : n = 3, number = 7

Output : 70336

Input : n = 3, number = 4

Output : 124200

Explanation:

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

main components of Adobe photoshop are. ...............
a) title bar
b) tool bar
c) menu bar
d) all of this ​

Answers

Answer:

The correct option is;

d) All of this

Explanation:

The main components of Adobe Photoshop are;

1) Title bar displays the name of the application, as well as the name of the current document and it is located at the top of the document window

2) Tool bar is the component of the interface design in which on-screen buttons, menus, icons, and other features for input and output are placed

The tools palette is the toolbar in Adobe Photoshop

3) Menu bar consists access to the basic components such as file, edit, image, layer, used to create new jobs, compose, and edit images.

Answer:

It is all of this.

Explanation:

Here it is

Businesses today suceed or fail based on their ability to

Answers

Answer:

their ability to Innovate with technology to meet their customers needs

Explanation:

Identify characteristics of top-down programming design. Choose all that apply.
It assumes the problem has a simple solution.
It is good for running simple calculations.
It is simple to modify if steps change.
It is made of one or more modules.
It breaks a task into simpler and simpler steps.

Answers

Answer:

The correct option is;

It is made of one or more modules.

It breaks a task into simpler and simpler steps.

Explanation:

The implementation of top-down programming approach begins from the system defining basic modules and progresses by putting in place intermediate modules that take charge of more detailed and complex activities and processes. The intermediate modules are further streamlined into more specific programming

Therefore, the top-down programming is made of one or more modules that breaks a task into simpler and simpler steps.

Answer:

A, B, D and E

Explanation:

there are 9 CTSOs, name 3

Answers

Bjhfjjhhuuhhggghhhhhh
Business Professionals of America.
DECA.
Family, Career and Community Leaders of America.

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.
Other Questions
Hey! i've been working on these questions but I have no idea how to solve this one, could anybody help me? Thanks in advance! Suppose that 200 students are randomly selected from a local college campus to investigate the use of cell phones in classrooms. When asked if they are allowed to use cell phones in at least one of their classes, 40% of students responded yes. Using these results, with 95% confidence, the margin of error is 0.068. How would the margin of error change if the sample size increased from 200 to 400 students? 64. A heart pacemaker fires 72 times a minute, each time a 25.0-nF capacitor is charged (by a battery in series with a resistor) to 0.632 of its full voltage. What is the value of the resistance The figure below shows a parallelogram ABCD Side AB parallel to side DC and side AD is parallel to side BC A student wrote the following sentences to prove that parallelogram ABCD has two pairs of opposite sides equal For triangles and COB alternate interior angle ABD is congruent to angle CDB because AB and DC are parallel lines Similarly interior angle equal to angle CBD because AD and are parallel lines equal to DB by the reflexive property Therefore , triangles ABD and COB are congruent by the SAS postulate Therefore AB congruent to and AD congruent BC CPCTC Which statement best describes a flaw in the student's proof ? Define employment. Write in brief about international employment. Paul asked ________________ to join him in his work at Lystra while on his second missionary journey. In "Comprehending the Calamity," in which order does the author present the key events of the text? Comprehending the Calamity 1. The earthquake demolishes the city. 2. People help at the hospital. 3. People relocate to the park. 4. Fire destroys the city. 1. The earthquake demolishes the city. 2. People relocate to the park. 3. People help at the hospital. 4. Fire destroys the city. O 1. The earthquake demolishes the city. 2. Fire destroys the city. 3. People help at the hospital. 4. People relocate to the park. 1. The earthquake demolishes the city. 2. People relocate to the park. 3. Fire destroys the city. 4. People help at the hospital. The difference between total sales revenue and total cost of goods sold is the: A. Trade margin B. Gross marketing contribution C. Net marketing contribution D. All of the above the title of this text is "Energy Efficiency".What could be another good title for this next time Pennsylvania Refining Company is studying the relationship between the pump price of gasoline and the number of gallons sold. For a sample of 14 stations last Tuesday, the correlation was 0.65. Can the company conclude that the correlation is positive Proofread the passage and identify spelling errors and improper use of punctuation.The world today is filled with advertisements. We see them on TV, in the newspaper, on the Internet, and in our surroundings. The advertising industry effects the way we look at and judge people around us. Catchy taglines and trendy jingles influence our choices on a daily basis. We constantly change our lifestyles depending on the current trends. We feel compelled to buy products, that keep popping up on our screens. We struggle to keep up in a race for getting the newest or most popular product.1. Filled2. Advertising 3. effects4. influence 5. struggle When you start your computer then which component works first? In what two ways did Northerners respond to the Emancipation Proclamation? What is the mole fraction of urea, CO(NH2)2, in a solution prepared by dissolving 4.0 g of urea in 32.0 g of methanol, CH3OH Electronic configuration is best described asa. protons in the nucleus of atomb. electrons on the outermost orbitc. attraction of electrons between two atoms d. arrangement of electrons in an atom Lew's has 500 bonds outstanding with a price quote of 98.6. There are also 12,000 shares of common stock selling for $47 a share and 5,000 shares of preferred stock at $70 a share. What is the weight of equity Josephine has a rectangular garden with an area of 2x2 + x 6 square feet. A rectangle labeled 2 x squared + x minus 6 Which expressions can represent the length and width of the garden? length = x2 3 feet; width = 2 feet length = 2x + 3 feet; width = x 2 feet length = 2x + 2 feet; width = x 3 feet length = 2x 3 feet; width = x + 2 feet write the questions for the underlined words. i met my cousin yesterday -> Whom did you meet yesterday?. the Muong inhabited viet nam thousands of years ago -> _____________________ This is for my math class WILL MARK BRAINLIEST!!! PLZ HELP! The following graph describes function 1, and the equation below it describes function 2. Determine which function has a greater maximum value, and provide the ordered pair. Function 1 Function 2 f(x) = x2 + 4x + 1 Function 1 has the larger maximum at (4, 1). Function 1 has the larger maximum at (1, 4). Function 2 has the larger maximum at (2, 5). Function 2 has the larger maximum at (3, 2).