1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
6

A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.

Computers and Technology
1 answer:
valkas [14]3 years ago
6 0

Answer:

The correct answer to the following question will be "Application program".

Explanation:

  • Applications include database programs, word processors, browsers, development tools, picture editors, and platforms for communication.
  • It use the OS (Operating System) of the computer and many other assisting programs, frequently system software, to work.
  • An application program is a detailed, body-contained program that directly works a given function for just the user.

There are some examples of application programs such as:

  • Includes various bundled software.
  • Addresses an organization's data management and application requirements, covering all divisions.
  • It allows users can create and manage information.
  • Used primarily to get content access without editing.

You might be interested in
Which of the following is normally mutually exclusive<br> Read only files<br> Printer<br> WIFI
marin [14]

Answer:

the answer is going to be printer

5 0
2 years ago
How long would you need to work at McDonalds to earn enough money to buy a optiplex 3050, monitor, mouse and keyboard all from d
r-ruslan [8.4K]
So assuming you were buying this piece of trash with the mouse and keyboard it would be around $450. Average pay per hour is $9.10-$10.20 depending on were you live so we will just say $9.50. You'd need to work rougly 47 hours (without taxes) So i'd say 65-75 Hours.
8 0
3 years ago
Read 2 more answers
What is the operation of an earth leakage tester
Vladimir [108]

In any electrical installation, some current will flow through the protective ground conductor to ground. This is usually called leakage current. Leakage current most commonly flows in the insulation surrounding conductors and in the filters protecting electronic equipment around the home or office. So what's the problem? On circuits protected by GFCIs (Ground Fault Current Interrupters), leakage current can cause unnecessary and intermittent tripping. In extreme cases, it can cause a rise in voltage on accessible conductive parts. 


5 0
3 years ago
To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as
valkas [14]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

  1. resolution.
  2. magnification.
  3. orientation.
  4. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.

7 0
3 years ago
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
Other questions:
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • Which option describes the purpose of configuring native supplicant profile on the cisco ise?
    7·1 answer
  • The page orientation in which the page width is greater than the page height is called
    8·1 answer
  • To reload a picture taken with a digital camera means to copy the digital picture from the camera to your computer.
    5·2 answers
  • The code below is supposed to display the name and score for the student with the highest score one time before the program ends
    12·1 answer
  • Which one is not an operating system?1.mac 2.Microsoft office3.Iso.3.Android
    11·1 answer
  • Identify the use of queue in the process of spooling output to a printer.
    15·1 answer
  • This isn't an academic question, but can anyone help me change the face on my apple watch to a picture from my camera roll? I've
    15·1 answer
  • What is destination email address​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!