1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
12

Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co

mputer software?
a. World Wide Web personal use and productivity software
b. Application software
c. Hardware coordination software
d. System software
Computers and Technology
1 answer:
wariber [46]3 years ago
8 0
The correct answer is letter B. Application Software. Word Processing software, spreadsheet software, database software, and presentation software are examples of Application software. These are applications that are mostly output based.
You might be interested in
Given ProblemSolution class. Use a pointer to object of "ProblemSolution" class to invoke the "CalculateSum" and "Print" methods
faltersainse [42]

Answer:

#include <iostream>

using namespace std;

class  ProblemSolution {

private:

int num1, num2;

public:

ProblemSolution(int n1, int n2) {

 num1 = n1;

 num2 = n2;

}

int calculateSum() {

 int sum = 0;

 sum = num1 + num2;

 return sum;

}

void printSum() {

 // calculateSum will return sum value that will be printed here

 cout <<"Sum = "<< calculateSum();

}

~ProblemSolution() {

 cout << "\nDestructor is called " << endl;

};

};

int main() {

int a, b;

cout << "Enter a: ";

cin >> a;

cout << "Enter b: ";

cin >> b;

// Initiallizing object pointer of type ProblemSolution

ProblemSolution *objPtr = new ProblemSolution(a,b);

// printing Sum

objPtr->printSum();

// delete objPtr to relaease heap memory :important

delete objPtr;

return 0;

}

Explanation:

we will initialize  a pointer "objPtr" and initallize the constructor by passing 2 values a and b followed by the keyword  "new". the keyword "new" allocates memory in the heap. we can access class member functions using arrow "->". it is important to delete objPtr at the end of the program so that the heap memory can be freed to avoid memory leakage problems.  

3 0
3 years ago
Which of the following is true? You are a project manager for Laredo Pioneer's Traveling Rodeo Show. You're heading up a project
nika2105 [10]

Answer: C. You are a project manager for Laredo Pioneer's Traveling Rodeo Show. You're heading up a project to promote a new line of souvenirs to be sold at the shows. You're ready to document the processes you'll use to perform the project as well as define how the project will be executed and controlled and how changes will be monitored and controlled. You are working on the project management plan.

Explanation:

4 0
3 years ago
NO LINKS&lt;br /&gt;Write a C program called velocity.c to do the following activities.&lt;br /&gt;• The parent process should r
algol [13]

Answer:

uhm.....im confused a bit here

3 0
3 years ago
How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
vekshin1

Answer:

Following are the solution to this question:

Explanation:

Two tuples were fully identified only with UDP socket.:

< IP address assigned, the port for destination >

Its two tuples have been used in UDP as demux, buttons to identify its UDP socket.

The IP address for the destination:

Its received data is directly provided by the IP address of its port.

Port number of the destination:

The function of the IP address of its port number whenever you obtain a UDP segment would be to control the IP addresses of a segment or send that segment to a port with the same IP address. Its port number for endpoint allows demultiplexing incoming information from its IP.

TCP socket is completely recognized by the following four tuples:

< source IP, port source, IP source, port location >

It tuples are being used to label the sockets by using a demultiplexing (demux) key.

IP address source:

The IP address is being used to identify the unique host that links to. It can assume that perhaps the source IP address shows us all the source Addresses of the sender.

Port number of source:

Its port number amount allows us to identify which section is arriving at which port.

IP address destination:

Its IP address of a destination is the IP address of a port accepting incoming information.

Port number of the destination:

It is port numbers number allows us to identify the facilities or section should be sent to.

Differentiation between TCP and UDP identifier:  

As TCP ports (4 tuples) and UDP ports (2 tuples) are using demux keys to define socks, however, demux keys in UDP are unique from others in TCP for both the following reasons:

TCP uses a separate socket for every contact between both the server and client whereas UDP utilizes its same sockets to process all clients accessed by UDP servers with all communications, it maintains TCP is much more dependable and hence has to hold a different port.

Even so, UDP doesn't accomplish things apart from multicasting and demodulation, but no separate port is necessary by each link. Therefore the TCP socket becomes connection-driven as well as the UDP socket is direct link-free.

5 0
3 years ago
Which statement indicates that a personal computer is a good not a service?
koban [17]

Answer:

are there A,B,C and D answers to the question I need the statements

7 0
4 years ago
Read 2 more answers
Other questions:
  • What do you think of explaining to young people, from high school, the legitimacy of copyright and the dangers they can run on t
    11·1 answer
  • What does a compiler do, and why is it necessary when using higher-level languages?
    10·1 answer
  • Who is a miner?
    9·1 answer
  • ___ is the technology used by smart phones to send text messages.
    6·1 answer
  • Which view is easiest and most recommended for changing the order of the slides? A. Slideshow View B. Slide Sorter View C. Readi
    5·2 answers
  • How is a composite key implemented in a relational database model?
    11·1 answer
  • ___ allow users to select controls by keyboard shortcuts. (Points : 3) Alternative keys
    13·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • Which of these is NOT an example of lifelong learning?
    6·1 answer
  • Ask the user to input their grade percentage (e.g. the use will enter 98 if they had an overall grade of 98% in their course) fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!