1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
2 years ago
14

Fill in the missing terms relating to computer software

Computers and Technology
1 answer:
Tcecarenko [31]2 years ago
6 0

The missing terms relating to computer software are:

  • Utilities
  • application software.
<h3>What are Programs designed to perform specific tasks?</h3>

Programs that are made to carry out specific tasks is known as application software.

Note that An application software is said to be a computer software set up to carry out a group of coordinated functions and as such, The missing terms relating to computer software are:

  • Utilities
  • application software.

Learn more about computer software from

brainly.com/question/1538272

#SPJ1

You might be interested in
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
So I try to login into my origin account and this popped up.(photo). But everytime I try to type in something I’m unable to clic
Oduvanchick [21]
You have to restart your computer or maybe use another internet browser to access the website your trying to reach
7 0
3 years ago
What is the output of intb= 4+ 6 /2 Systemoutprintln (b)
uysha [10]

Answer:

Command: Systemoutprintln (b)

Output: 7

Explanation:

To solve this problem, we must take into account the precedence of operation.

The division takes precedence before the addition, so we must divide before we add for b.

So

int b = 4 + 6/2 = 4 + 3 = 7.

So

Command: Systemoutprintln (b)

Output: 7

5 0
3 years ago
Information that has been analyzed and refined so that it is useful to policymakers in making decisions; specifically, decisions
denis-greek [22]

Answer:

Intelligence

Explanation:

Intelligence is the product resulting from the collection, collation, evaluation, analysis, integration, and interpretation of collected information. It is a specialised information product that provides an adversary with information required to further its national interests. One of the most important functions of intelligence is the reduction of the ambiguity inherent in the observation of external activities.rations.  

In most cases, the development of an intelligence product involves collecting information from a number of different sources. In some cases, information may be disseminated immediately upon collection based upon operational necessity and potential impact on current operations.

Strategic intelligence provides policy makers with the information needed to make national policy or decisions of long-lasting importance. Strategic intelligence collection often requires integrating information concerning politics, military affairs, economics, societal interactions, and technological developments. It typically evolves over a long period of time and results in the development of intelligence studies and estimates.

Operational intelligence is concerned with current or near-term events. It is used to determine the current and projected capability of a program or operation on an ongoing basis and does not result in long-term projections. Most intelligence activities support the development of operational intelligence.

8 0
3 years ago
PLEASE HELP ASAP!
BlackZzzverrR [31]
A- software requirement specifications
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which business filing process puts documents or data in the order by date? a. Linear
    7·1 answer
  • True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
    7·1 answer
  • 4.5 Code Practice
    15·1 answer
  • What is an advantage of a computer network ? networked
    13·2 answers
  • How can i change my age on my profile here bc i am 13 but i accidenlty put 2005 instead of 2006 no need to rush to answer just w
    9·2 answers
  • All of the following are used to fund private schools except ______
    14·2 answers
  • A deluxe meal, represented by a DeluxeMeal object, includes a side dish and a drink for an additional cost of $3. The DeluxeMeal
    14·1 answer
  • Can you help me, please
    10·1 answer
  • Which of the following is the file type of Microsoft® Publisher files?
    12·2 answers
  • Edge is a video game featuring interactive extreme sports. The graphics used in the game are protected by
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!