1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
15

You listened to a song on your computer. did you use hardware or software? explain.

Computers and Technology
1 answer:
scZoUnD [109]3 years ago
4 0
Software, unless you planned on permanently downloading the Music Album or Song to your computer's Hard Drive. i.e, you would use whatever Music or Media player you have installed on your computer, and that simply counts as Software. 
You might be interested in
Analyze the following code:public class Test {public static void main(String[] args) {int[] x = new int[5];int i;for (i = 0; i &
lora16 [44]

Answer:

The answer to this question is the option "C".

Explanation:

In the given java program, it will be given an error message that is "ArrayIndexOutOfBoundsException" which means that We're trying to access the illegal index array element. This exception is displayed when the index is either negative or larger than or equal to the array size. and other options are not correct that can be given as:

  • The option A and B will not correct because it will give an error message.
  • The option D is not correct because variable i is defined in the main method.

That's why the answer to this question is the option "C".

5 0
3 years ago
Which is an ipsec protocol that authenticates that packets received were sent from the source?
fiasKO [112]

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

6 0
2 years ago
Suppose a scanner object is created as follows: scanner input = new scanner(system.in); what method do you use to read a real nu
Allushta [10]

Suppose a scanner object is created as follows: scanner input = new scanner(system.in); the method you use to read a real number is Scanner input = new Scanner(System.in); input. nextDouble();

This is because the Scanner input = new Scanner(System.in); input. nextDouble(); command creates the input for a number that contains both whole numbers and decimal numbers and this is why double is used and not int.

<h3>What is a Double in Programming?</h3>

This refers to the fundamental data type that is encoded into the compiler and used to define numeric variables holding numbers with decimal points

Hence, we can see that Suppose a scanner object is created as follows: scanner input = new scanner(system.in); the method you use to read a real number is Scanner input = new Scanner(System.in); input. nextDouble();

This is because the Scanner input = new Scanner(System.in); input. nextDouble(); command creates the input for a number that contains both whole numbers and decimal numbers and this is why double is used and not int.

Read more about double and float here:

brainly.com/question/13260053

#SPJ1

6 0
1 year ago
Which string of octal values in the conversion table can be used to represent the word "BAKE"?
stealth61 [152]

Answer:

b 10

a 1

k 1011

e 101

that is the answer to the question.

4 0
3 years ago
You have an Active Directory forest named csmtech.local and two Active Directory domains in the forest named csmpub.local and cs
NeTakaya

Answer:

ecognize a statistical question as one that anticipates variability in the data related to the ... right now?” a) The ... c) This is not a statistical question because there ... predicted that more people sent 80 to 99 emails than 0 to 19 emails per week. Complete the histogram to represent the data. Is Lisa's prediction valid?

Explanation:

4 0
3 years ago
Other questions:
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
    10·1 answer
  • Carol purchases a computer. She installs speech recognition software on the computer.
    9·1 answer
  • To adapt to dimmer light with a film camera would be more complicated than with a digital
    5·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • Assignment
    13·1 answer
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • Discuss advantages and disadvantages of os
    5·1 answer
  • Complete the sentence based on the given information.
    15·1 answer
  • What is the definition of Graphic AIDS?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!