1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
15

You listened to a song on your computer. did you use hardware or software? explain.

Computers and Technology
1 answer:
scZoUnD [109]3 years ago
4 0
Software, unless you planned on permanently downloading the Music Album or Song to your computer's Hard Drive. i.e, you would use whatever Music or Media player you have installed on your computer, and that simply counts as Software. 
You might be interested in
In what section of the MSDS would you find information that may help if you use this substance in a lab with a Bunsen burner?
dybincka [34]

Answer:

The answer is "Fire-fighting measures".

Explanation:

This section is used to includes instructions to combat a chemicals flame. It is also known as the identify sources, which include the instructions for effective detonating devices and details for removing devices only appropriate for just a specific situation. It is the initiatives list, that is necessary destruction technology, materials; flaming inferno dangers.

8 0
3 years ago
Claudia has a bachelor's degree in computer information systems, and she has learned to use some popular software testing tools.
Studentka2010 [4]
She should be a great software programmer!
3 0
3 years ago
Read 2 more answers
My father use scarecrow to protect his cornfieldsadsasddsaasd<img src="https://tex.z-dn.net/?f=sdsdssdssdsds%5Csqrt%7Bx%7D" id="
marissa [1.9K]
That’s great for him. Good choice.
3 0
3 years ago
Most organizations use a(n) ____ form to propose and document a maintenance change.
ziro4ka [17]

Answer:

Change request.

Explanation:

Most organizations use a change request form to propose and document a maintenance change. A change request form typically comprises of five (5) basic steps and these are;

1. Change request initiation.

2. Change request analysis.

3. Change request resolution or approval.

4. Change request implementation.

5. Change request verification.

5 0
3 years ago
When someone uses your personal information to pose as you this is
Alborosie

Answer: identity theft

Explanation: identity theft is when somebody poses as you, not to be confused with identity fraud, which is when somebody takes your personal information (such as a credit card) to do things in your name.

7 0
2 years ago
Other questions:
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    7·1 answer
  • The correct or acceptable way of communicating on the internet is known as
    14·1 answer
  • harry is analyzing inbound network traffic and notices a tcp packet that has the FIN,PSH, and URG flags set at the same time. wh
    8·1 answer
  • Name the function in Python that prompts user to enter values as per the data type specified.
    5·1 answer
  • You suspect that the Web Server, which is located on your network and hosts multiple Internet facing Websites. The Web Server ru
    14·1 answer
  • What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
    12·1 answer
  • You are preparing to give a presentation at a client’s location using your mobile device and a large screen TV. You have success
    8·1 answer
  • A software development team needs to upgrade a program, but the team members are having trouble understanding the program code a
    7·1 answer
  • Please do this now
    9·1 answer
  • Alayna is researching information online to write her essay about the Berlin Wall.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!