what are major classification of computer software​

Answers

Answer 1

Answer:

Application Software.

System Software.

Programming Software.

While application software is designed for end-users, and system software is designed for computers or mobile devices, programming software is for computer programmers and developers who are writing code.

Driver Software.

Explanation:

Answer 2

Typically, there are two major classifications of software, namely System Software and Application Software.

1. System Software

A system software aids the user and the hardware to function and interact with each other. Basically, it is a software to manage computer hardware behavior so as to provide basic functionalities that are required by the user. In simple words, we can say that system software is an intermediator or a middle layer between the user and the hardware. These computer software sanction a platform or environment for the other software to work in. This is the reason why system software is very important in managing the entire computer system. When you first turn on the computer, it is the system software that gets initialized and gets loaded in the memory of the system. The system software runs in the background and is not used by the end-users. This is the reason why system software is also known as ‘low-level software’.Some common system software examples are:

Operating SystemDevice DriversFirmwareProgramming Language TranslatorsUtility

2. Application Software

Application Software, also known as end-user programs or productivity programs are software that helps the user in completing tasks such as doing online research, jotting down notes, setting an alarm, designing graphics, keeping an account log, doing calculations or even playing games. They lie above the system software. Unlike system software, they are used by the end-user and are specific in their functionality or tasks and do the job that they are designed to do. For example, a browser is an application designed specifically for browsing the internet or MS Powerpoint is an application used specifically for making presentations. Application Software or simply apps can also be referred to as non-essential software as their requirement is highly subjective and their absence does not affect the functioning of the system. All the apps that we see on our mobile phones are also examples of Application Software. There is certain software that is exclusively made for app development like Meteor and Flutter. These are examples of Application software too.There are various types of application software:

Word ProcessorsDatabase SoftwareMultimedia SoftwareEducation and Reference SoftwareGraphics SoftwareWeb Browsers

Other than these, all the software that serves a specific purpose fall under the category of Application Software.

However, there exists one more classification of the software. The software can also be classified based on their availability and sharability.

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️


Related Questions

If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2

Answers

Answer:

Yes

Explanation:

Because all answers are intotal (2)

do you agree or disagree with the assertion that edutech transforms teachung and learning ​

Answers

Answer:I agree!

Explanation:

Agree

Fill in the blanks, so the print statement displays the result of the function call in order.

1 # This function compares two numbers and returns them
2 # in increasing order.
3 - def order_numbers(number1, number2):
4. if number2 > number1:
5 return numberi, number2
6 else:
7 return number2, number1
8
9 Run # 1) Fill in the blanks so the print statement displays the result # of the function call
10 ---, --- = order_numbers(100, 99) print(smaller, bigger)

Answers

Answer:

Rep;ace the blank with

smaller, bigger

So, the complete line is:

smaller,bigger=order_numbers(100,99)

Explanation:

From the question, we understand that the program is to return the order of a number from least to highest

This has been well implemented in order_numbers function

Because the order function returns two values, the order_function must be called in order to accept two values and the syntax is:

value1,value2 = function(return-value1,return-value2)

In this case, the statement is:

smaller,bigger=order_numbers(100,99)

So, in the next line of the main, the values of smaller and bigger are printed:

print(smaller,bigger)

See attachment

Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Bob is unable to get any useful results. Why is Bob having these problems?

Answers

Incomplete question. The full question read;

Why is Jim having these problems?

Options:

A. Security scanners are not designed to do testing through a firewall.

B. Security scanners cannot perform vulnerability linkage.

C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

D. All of the above.

Answer:

D. All of the above.

Explanation:

Remember, security scanners are only designed to gather information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.

Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.

The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL.

Answers

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

anyone have the Dell xps 13 laptop? if not pls don't answer but if you do, how is it going for you?​

Answers

I do and it’s going alright; would recommend. Here’s what I think in bullet points.

- Good aesthetic design. Weave-like texture is nice and somewhat opulent.

- Good performance; you can overclock the i7 CPU.

- Battery life is at the upper end of the spectrum.

- No USB Type A Ports, big downside.

- Graphics are about 1000 points above industry average (3D Mark Fire Spark)

- Uses an SSD rather than a HDD; much quicker load time.

- I’d go for the $1,899 personally; it’s worth the extra money.

Thanks.

Yes and I really love it

Which of the following options allow you to access a computer remotely?

a. NTP
b. SSH
c. Server
d. VPN

Answers

Answer:

b. SSH

Explanation:

Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.

Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.

Thus, option "B" is the right answer.

A certain instructor assigns a 50-point problem and calculates an integer score 0-50 and assigns a letter grade according to the scale 40 - 50 is an A, 30 - 39 is a B, 20 - 29 is a C, 10 - 19 is a D and 0 - 9 is an F. Write a Python function called letter_grade which takes one argument, an integer, and RETURNS the appropriate letter grade.

Answers

Answer:

Following are the code to this question:

def letter_grade(x): #defining a method letter_grade that accepts one parameter

   if x>=50 and x<=40:#defining if block that check value of x greater than 50 and less than 40

       print("A")#print value

   if x>=30 and x<=39:#defining if block that check value of x greater than 30 and less than 39

       print("B")#print value

   if x>=20 and x<=29:#defining if block that check value of x greater than 20 and less than 29

       print("C")#print value

   if x>=10 and x<=19:#defining if block that check value of x greater than 10 and less than 19

       print("D")#print value

   if x>=0 and x<=9:#defining if block that check value of x greater than 0 and less than 9

       print("F")#print value

letter_grade(30) #calling the method letter_grade

Output:

B

Explanation:

In the above Python code, a method "letter_grade" is declared, that accepts an integer variable in its parameter, and defined the multiple if block to check the given value, which can be defined as follows:

In the first, if block, it checks the value of x greater than 50 and less than 40 , if the condition is true it will print the value "A".In the second, if block, it checks the value of x greater than 30 and less than 39,  if the condition is true it will print the value "B".In the third, if block, it checks the value of x greater than 20 and less than 29,  if the condition is true it will print the value "C".  In the fourth, if block, it checks the value of x greater than 10 and less than 19,  if the condition is true it will print the value "D".In the fifth, if block, it checks the value of x greater than 0 and less than 9,  if the condition is true it will print the value "F".

And at the last it call the method.

_______and ________ enables computers to communicate and it can pass information between two networks.

Answers

Answer:

Internet Protocol and Transmission Control Protocol        

Explanation:

Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other.  They are developed by Bob Kahn and Vint Cerf.

What is computer virus?​

Answers

Answer:

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Explanation:

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Simply, a computer virus is a harmful multiplying code that harms your computer and makes it slower, harder to use, and more vulnerable to other harmful unsafe software, apps, downloads and more.

How to get it?

You can get computer viruses just from going to unsafe websites downloading harmful files downloading harmful images downloading harmful videos clicking unsafe advertisements

and thats just a couple of examples, there's many many more but you get the idea.

Something that really sucks about computer viruses is that its hard to tell if something online is dangerous or not.

That's why people make specific softwares to protect your computer but even those can be unsafe or people could be trying to trick you.

Sometimes the computer will already have some sort of app or software to protect it from these harmful files, but make sure to pay attention when your on websites and check the urls and make sure it doesn't say anything along the lines of "unsafe" if it says that just simply exit the website and dont do anything further.

If your experiencing slowness, files you don't remember saving on your computer or extra files and apps that dont seem to belong, im sure there are places you can call online or in your local area to help with these issues.

Hope this helped!!

Which interpersonal skill is the most important for a telecom technician to develop?

active listening

teamwork

conflict resolution

social awareness

Answers

Answer:

active listening is interpersonal

Answer:

active listening

Explanation:

edg2021

telecom technicians go to homes and officies to listen to the consumers demands to fix their internet and other telecommmunication issues. They mostly work alone and simply need to be aware of the issue and what they are doing to fix it.

Anna is creating a digital portfolio, including her professional work showcasing the designs she created. What should she add to each work?

A. brief description of the work and project details
B. only title of the work
C. only date and title of the work
D. only project details of the work

Answers

A. Brief description of the work and project details.

CAN SOMEONE DO OR LOOK UP THE PIE CHART FOR THIS ANSWER PLS AND I WILL MARK YOU BRAINLIEST BUT PLSSS HELP MEEEE!!!

Answers

Answer:

I highly recommened you use ggl charts.

Explanation:

It's free. ALL YOU NEED IS AN GGL ACCOUNT. You can also choose many types of graph you want.

help with these 2 questions srry for the horrible pic​

Answers

Answer:

the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.

Explanation:

Answer:

I cant read

Explanation:

What sum will amounts to Rs 1227 in 9 months at 6%
e emple Interest 2.​

Answers

Answer:

given us,

principal (p)= Rs 1227

Time(t)= 9

Rate(r)= 6./.

Here,

simple interest= P×T×R/100

= 1227×9×6/100

= 66258/100

= 662.58

Explanation:

by using simple interest formula

The principal investment required to get a total amount, principal plus interest, of Rs 227.00 from simple interest at a rate of 6% per year for 0.75 years (9 months) is $1,174.16

Given Data

Final Amount A = Rs 1227

Time = 9 months

Rate = 6%

Principal = ?

Equation:

P = A / (1 + rt)

Calculation:

First, converting R percent to r a decimal

r = R/100 = 6%/100 = 0.06 per year.

Putting time into years for simplicity,

9 months / 12 months/year = 0.75 years

Solving our equation:

P = 1227 / ( 1 + (0.06 × 0.75)) = 1174.1626794258

P = $1,174.16

Learn more about simple interest here:

https://brainly.com/question/2294792

Assume that x and y are boolean variables and have been properly initialized.(x && y) || !(x && y) The result of evaluating the expression above is best described as (A) always true (B) always false (C) true only when x is true and y is true (D) true only when x and y have the same value (E) true only when x and y have different values

Answers

Answer:

(A) Always true

Explanation:

Given

Boolean variables x and y

Required

What is (x && y) || !(x && y)

Irrespective of what x or y is, the x && y is always true

Take for instance:

x = true;

y = true;

x&&y will also be true because the values of x and y were not altered

And this is true for whatever boolean value x or y assume

Having said that:

x&&y = true

So, the expression is analysed as follows:

(x && y) || !(x && y)

Substitute true for x&&y

(true) || !(true)

!(true) = false

So, the expression becomes:

true || false

|| represents the OR operator; and it returns true if at least one of the conditions is true.

By this:

true || false = true

Option (A) Always true answers the question.

Ship, CruiseShip, and CargoShip ClassesDesign a Ship class that has the following members:a. a member variable for the name of the ship (a string)b. a member variable for the year that the ship was built (a string)c. A constructor and appropriate accessors and mutatorsd. A virtual print function that displays the ship's name and the year it was built.

Answers

Answer:

def shipvari(ship);

Cruiseship="" #defining a string

YearBuilt= ""

for i in range(ship);

if Cruiseship="";

print(CruiseShip)

Give the rest a try!

One of the keys on my keyboard doesn’t work but It’s used to login to windows. I’m trapped outside. What should i do :(

Answers

uhm- sorry, could explain this in a simpler way?

Write a program that reads an integer and determines and prints whether it is odd or even.

Answers

num = int(input("Enter a number: "))

print(str(num)+" is even" if num % 2 == 0 else str(num)+" is odd")

I wrote my code in python 3.8. Best of luck.

You are suddenly given a very large (1000 ) number of old desktop computers with old CRT monitors. What could you do with them

Answers

Answer:

I would fix them if they were broken, make good use of them and give them out to other people as marketing or sell them.

Explanation:

Sara would like to begin creating macros in Excel 2016. Where can she find the ability to launch the Macro dialog box?

Insert tab in the Macros group
Formulas tab in the Macros group
Developer tab in the Code group
Developer tab in the Add-ins group

Answers

Answer:

C) Developer tab in the Code group

Explanation:

Write a 200 word essay about how a computer is made.

Good luck.​

Answers

Answer:

Essay about how a computer is made is written below in detailed explanation.

Explanation:

After so many discoveries and inventions, Humans ultimately made the computer. And, today some personalities in the world can't exist a bit without a computer.

The computer is an electric device that is utilized for collecting and processing data. The hard work can be completed in a shorter time with the guidance of computers. With the assistance of the computer, we can do all the stuff in today's world.. Because of this, the computer performs a vital purpose in this contemporary life.

The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.

Answers

Answer:

"Cross-training " seems to be the right response.

Explanation:

Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.

As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors

Answers

Answer:

Printing devices

Video, Audio devices

Communication machines

Explanation:

Printing devices - Sysadmin needs this type of devices for print important data and information.

Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.

Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.

Tips for staying safe using social media. Using in your own words.

Answers

Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.

Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.

In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.

Why I/O modules is needed between system bus
and I/O devices?​

Answers

Answer:

1. Processor communication -- this involves the following tasks:

a. exchange of data between processor and I/O module

b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc.

c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors.

d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address.

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

The five types of personal computers are: desktops, laptops, tablets, smartphones, and ________.
a) microcomputers.
b) wearables.
c) macrocomputers.
d) midranges.

Answers

Answer:

B. Wearables.

Explanation:

These are tagged to be a category now in the technology as they are seen to make up the fifth type of personal computers in the question above. These are seen to be attached on the body or sometimes embedded to our outfit and also in other cases hung on a part of our body. They are counted to range from fitness trackers to smart watches, headsets etc. They are said to posses microprocessors which aid their functional ability through its use of the internet.

Answer:

Explanation:

B. Wearables.

Explanation:

These are tagged to be a category now in the technology as they are seen to make up the fifth type of personal computers in the question above. These are seen to be attached on the body or sometimes embedded to our outfit and also in other cases hung on a part of our body. They are counted to range from fitness trackers to smart watches, headsets etc. They are said to posses microprocessors which aid their functional ability through its use of the internet.

A software is made from​

Answers

Answer:

Two or more languages are used for making one particular software.

Divide a network 10.10.0.0 with subnet mask 255.255.0.0 into 62 subnets.

10.10.0.0
0000 1010. 0000 1010 . 0000 0000 . 0000 0000

255.255.0.0
1111 1111. 1111 1111 . 0000 0000 . 0000 0000

Required:
a. How many bits do we need to borrow from the host portion?
b. List the lowest and the highest IP address of the first usable subnet.
c. How many usable hosts are there in total before and after subnetting?

Answers

Answer:

A. 6 bits

B. lowest IP address is  10.10.0.1  and the highest IP address is  10.10.3.254

C. total number of usable hosts before subnetting = 65534

total number of usable hosts after subnetting = 65408

Explanation:

The IP address 10.10.0.0 with the subnet mask 255.255.0.0 is a class B address with 16 bits of the network address portion and 16 bits of the host portion.

To subnet the address to use 62 subnets (and to reduce the host IP address wasted) 6 bits are borrowed from the host portion of the address to give 2^6 = 64 subnets with two usable host addresses.

The first network address is 10.10.0.0 and the first usable host address of the subnet is 10.10.0.1 making it the lowest address, while the broadcast address is 10.10.3.255 and the address before it becomes the higher address in the network which is 10.10.3.254

The number of usable host of the network before subnetting is 2^16 -2 = 65534, while after subnetting is (2^(16-6) - 2) x 64 = 65408.

Evaluate a career in the telecommunications industry that most interests you. What about the career appeals to you?
What qualifications do you already possess to make you successful in this career? Which skills do you still need to
develop to pursue this career?
Your answer should be at least 150 words in length.

Answers

Answer:

Network administrator and programmer.

Am still in A-level, am doing Physics, chemistry, Maths and ICT.

I have an A in physics, B in Chemistry and Maths and A† in ICT

Other Questions
Solve for x6.78x - 5.2 = 4.33x + 2.15HELPPP Work out the size of angle A Which function describes the arithmetic sequence shown? 1, 7, 13, 19, 25, 31 Ask me anything.ANYTHINGDont be boring How does a food chain illustrate the law of conversation of energy and mass in an ecosystem what helps the reader identify the audience for a literary text? Determine the number of lines of symmetry for the figure. With acute respiratory distress syndrome (ARDS), a client progressively increases his work of breathing. The physiological principle behind this respiratory distress is related to: a mat is 3m long and xm wide what is the area in m Please help with this. Evan reads that some minerals can come from organic processes. Where does the energy ultimately come from that is needed for organic materials to be made? 2x +18 = 9x + 14 for x. The boss repeated his routine advice, "Don't come late, don't leave early.and don't delay your work." *O PathosO PronounsO EthosO Repetition A door 2m*1m is fixed on a wall.The wall is 8.5 long and 2m high.Find the cost of whitewashing the wall 40 per square meter. Changing the point of view of a story can:A) change the settingB)change how the conflict is described C)provide context clues D)define difficult vocabulary words can someone with course hero help me plzzz!! please help me on this Three sisters purchased treats at a bake sale. The oldest sister spent $2.70 on brownies. The middle sister spent four times as much on cookies as the older sister spent on brownies. The youngest sister spent $3.68 less on a cake than the middle sister spent on cookies. How much did each sister spend? what are STD's? best answer gets brainliest :) Winston wants to put some very thick books on his bookshelf. Each book is 3 inchesthick. His bookshelf is 16 inches wide. How many thick books can he put on thebookshelf? (There will be space left over.)51156 What is the probability of the following, (for each answer, enter an exact number) (A) an event A that is certain to occur