1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
1 year ago
6

Which of the following can be termed ‘application software’?​

Computers and Technology
1 answer:
VLD [36.1K]1 year ago
4 0
There needs to be a pic or list i cant see the following
You might be interested in
How is cropping different from scaling?​
Keith_Richards [23]

Answer:

Scaling changes the size of the whole image by resampling it(duplicating the pixels). in cropping you only get a part of the original image/ remove the outer area of it .

Explanation:

8 0
3 years ago
Include the source code with comments for all modules in lab. you do not have to include test bench code. code without comments
hoa [83]
I like the UCF Football coach

7 0
3 years ago
How to find the average range of cells A1:A10
Ad libitum [116K]
Go to a blank cell and type

         =AVERAGE(A1:A10)      then  <ENTER>

As if by magic, the average of those cells
will appear where you typed the formula.
5 0
3 years ago
What are three ways of verifying legitimate right of access to a computer system?
dezoksy [38]

Something you know (such as a password)

Something you have (such as a smart card)

Something you are (such as a fingerprint or other biometric method)

<h3>What are the 3 methods of authentication?</h3>
  • The three authentication factors are Knowledge Factor – something you know, e.g. password.
  • Possession Factor – something you have, e.g.mobile phone. Inherence Factor – something you are, e.g., fingerprint.

To learn more about it, refer

to brainly.com/question/22654163

#SPJ4

7 0
2 years ago
What is the shortcut key for opening a new tab in a web browser.
goblinko [34]
Crtl + T is the answer
4 0
2 years ago
Other questions:
  • Emily wants to search online for cakes containing nuts. However, she wants to skip cakes that have raisins in them. Which option
    9·1 answer
  • The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and
    9·1 answer
  • Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detec
    8·1 answer
  • What is the purpose of an internet protocol address (ip address)?
    5·1 answer
  • Write an HLA Assembly language program that prompts for a specific int8 value named n and then displays a repeated digit pattern
    14·1 answer
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • Explain the need for data structures when developing software.
    12·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
  • Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to oper
    5·1 answer
  • Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!