1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
4 years ago
11

Describe software as a service. what features distinguish it from application software installed on a personal computing device

Computers and Technology
2 answers:
LekaFEV [45]4 years ago
7 0

Answer:

Any modern computer has a variety of softwares that do many tasks.

They can be classified into two broad categories:

• System software that included the firmware (The personal computer BIOS, for example), device drivers, the operating system, and typically a graphical interface that together allow the user to interact with the computer and its peripherals.

• Service software, which allows the user to do one or more specific tasks. Applications can have a wide range of use, often worldwide; In these cases, the programs tend to be more robust and more standardized. Programs written for a small market have a lower level of standardization.

Triss [41]4 years ago
6 0
???????????????????????????
You might be interested in
Why media is far from government​
DedPeter [7]

Answer:

An independent media means that no one should control and influence its coverage of news. Media is far from independent, this is because of control of government over them. Government prevents some news items, scenes from a movie, or lyrics of songs from being shared with larger public, this is called as censorship.

hope it helps

pls mark as brainliest.....

6 0
3 years ago
Read 2 more answers
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
Janice’s grandmother stayed at home and took care of her family while her grandfather worked. Today Janice lives on her own and
egoroff_w [7]
The answer is
b. Social change
6 0
3 years ago
Read 2 more answers
Jorge needs to print out an essay he wrote but he does not have a printer his neighbor has a printer, but her internet connectio
Aleks [24]

Answer:

if it's allowed, jorge should print his essay at school. he can also explain the situation to his teacher.

Explanation:

jorge printing his essay using his neighbor's printer would be unreliable because of her flaky internet connection, and jorge doesn't have a printer himself. since he's also getting late for school, he doesn't have many options and seems like he has no other option but to get to school before he's late and print it there instead.

8 0
3 years ago
what is hardware ? Name the four functional hardware of a computer system Define each of them with the help of a diagram​
Tasya [4]

Answer:

There are four main computer hardware components that this blog post will cover: input devices, processing devices, output devices and memory (storage) devices. Collectively, these hardware components make up the computer system.

5 0
3 years ago
Other questions:
  • What New England industry quickly collapsed with the discovery of oil in Pennsylvania?
    11·2 answers
  • You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on th
    10·1 answer
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    14·2 answers
  • Su
    6·1 answer
  • Explain the role of the network layer and Internet protocol (IP) in order to make internetworking possible.
    8·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • A store that has both an e-commerce site as well as a physical store (building) is known as:
    8·1 answer
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • In a conditional statement, the______ symbol is used to separate a test expression from the expression to be processed if the te
    10·1 answer
  • Which of these would be the best way to inform an employee that they are losing their job?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!