Which of the following can be termed “application software”? *
1 point
a) DOS
b) Linux
c) Defragment
d) Internet Explorer/ Microsoft Edge

Answers

Answer 1

The answer option which can be described as an application software is: d) Internet Explorer/ Microsoft Edge.

A software can be defined as a set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

In Computer and Technology, software applications (programs) are broadly classified into three (3) main categories and these are;

System softwareUtility softwareApplication software

An application software refers to a type of software applications (programs) that is typically designed and developed for the performance of a specific task rather than the operation of a computer system.  Some examples of application software include the following:

1. Internet Explorer/Microsoft Edge

2. Notepad

3. Windows media player

Find more information: https://brainly.com/question/14379808


Related Questions

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

to center data in a cell, click the ____ button on the ribbon.

Answers

To center data in a cell, click the center  button on the ribbon.

Data in a cell can be aligned either  horizontally or vertically .

For the  horizontal alignments, we have

against the left border, against the right border, and in the centre.

For the  vertical alignments, we have

against the top border, against the bottom border, and in the middle.

To center data, the following steps should be followed.

1.Click the cell where you want to center the data.  

2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.

3.Click the  drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

You want to kill all process IDs of a specific process with a single command. Which command should you use

Answers

Answer:

killall

Explanation:

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

Which Windows Server 2016 core technology provides a single interface for installing, configuring, and removing a variety of server roles and features on your Windows server

Answers

Answer:

Server manager

Explanation:

is invalid in the select list because it is not contained in either an aggregate function or the group by clause.

Answers

Answer:

Column

Explanation:

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

what is a collection of web pages containing text images audio and videos.​

Answers

Answer: A website..?

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.


Who plays a role in the financial activities of a company?

Answers

The chief financial officer

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient

Answers

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

External fragmentation may need a lot of compaction and it is an expensive operation.

The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

https://brainly.com/question/23636593

Other Questions
Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, networkattached storage, or the cloud? Why? What are some possible disadvantages of your recommendation that they should be aware of? How many square feet of glass are needed to cover the skywalk floor? (round your final answer to 1 decimal place and any intermediate calculations to 2 decimal places. Be sure to include units. ). When I was down beside the seaA wooden spade they gave to meTo dig the sandy shore.My holes were empty like a cup.In every hole the sea came upTill it could come no more."At the Sea-Side,"Robert Louis StevensonWhat is the central idea of the poem? Choose the best answer. what species accepts electrons in the final step of the electron transport chain? Theme and variations and rondo are two forms that focus on one main theme. How do they differ in their approaches to developing musical material? The Supreme Court may choose to remand a case, which means that __________.A.it sends the case back to the trial court or lower appellate court for further actionB.it dismisses the case and the lower court decision standsC.it grants a writ of certiorariD.it cannot reach a majority vote on the case Un estudiante de Astronoma sabe que Venus le da la vuelta al Sol 225 das y Marte 687 das . Si sabe que la ltima vez que v s , tierra y Marte se alinearon fue hace 1805645 das , en cuanto tiempo se volvern a alinear los 3 planetas al mismo punto? Solve the simultaneous equation3x-4y=119x+2y=5 A 66-inch candle burns down in 12 hours. After how many hours will it have burned 5 3/4 inches? Write an example of an appositive phrase. *This question is just to test your skill if you really know what an appositive phrase is.*Remember: appositive phrases do not start with verbs. What is dehydration reaction ? Which statement regarding the Berlin Airlift is the MOST accurate?A. The U.S. provided West Berlin with aid after Soviet forces blockaded the city.B. The U.S. dropped humanitarian supplies into East Berlin to prevent famine.C. The U.S. attempted to force a Soviet surrender by bombing BerlinD. The U.S. sought to contain the spread of communism among Allied powers. What is the sun's approximate azimuth when it sets? PLEASE ANSWER I GIVE BRAINLIEST AND 20 POINTS PLEEEEEAAAAAASSSSSEEEEE!! What happens to the genetic material before the cell divides who used the quote "I the Lord am your God You shall have no other gods besides Me." What is the recommendation to maintain a fit and healthy life regarding activity levels? How did the Magna Carta influence and the English Bill of Rights influence government in the Colonies, and be "baby steps" leading to the charter development of the United States? [a general/overview answer is OK] 6973x63 pls explain how u did it! I think of a number. I add 7, divide by 6, add 1 then square it. I get 9. What was my number? Determine the concentration of a diluted solution of sodium chloride that was prepared by diluting 20.0 mL of a 4.5 M solution of sodium chloride to 500.0 mL.