1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
15

Give 5 uses of software and hardware.

Computers and Technology
1 answer:
Annette [7]3 years ago
7 0
Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page is computer hardware. The Internet browser that allowed you to visit this page and the operating system that the browser is running on is considered software.

All software utilizes at least one hardware device to operate. For example, a video game, which is software, uses the computer processor (CPU), memory (RAM), hard drive, and video card to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents.

In a computer, hardware is what makes a computer work. A CPU processes information and that information can be stored in RAM or on a hard drive. A sound card can provide sound to speakers and a video card can provide an image to a monitor. All of this is hardware.

You might be interested in
A ________ is a virus that is triggered on a certain date.
marysya [2.9K]
A time bomb virus is a virus that is triggered on a certain date. It is a malicious program that is designed to release virus unto a system. Once the time has arrived, it will automatically start working what it is programmed to do since any virus could do anything depending on what it is designed to do.
8 0
4 years ago
A computer has three main modules that have individual reliabilities of 0.77, 0.94, and 0.81. Because of recent failures, manage
Artemon [7]
Yo también necesito ayuda con esto:(
6 0
3 years ago
Javascript is an object-based programming language that involves working with the properties and methods associated with objects
dimulka [17.4K]

Answer:

True

Explanation:

You can set variables and make method functions.

4 0
2 years ago
What is 1 of the rules for naming variables?
vova2212 [387]

Answer:

<h3>Rules for Naming Variables</h3><h3>The first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.</h3>

<em><u>#</u></em><em><u>M</u></em><em><u>a</u></em><em><u>r</u></em><em><u>k</u></em><em><u>a</u></em><em><u>s</u></em><em><u>b</u></em><em><u>r</u></em><em><u>a</u></em><em><u>i</u></em><em><u>n</u></em><em><u>l</u></em><em><u>e</u></em><em><u>s</u></em><em><u>s</u></em><em><u>p</u></em><em><u>l</u></em><em><u>e</u></em><em><u>a</u></em><em><u>s</u></em><em><u>e</u></em><em><u>✅</u></em>

3 0
3 years ago
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
timofeeve [1]
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
8 0
3 years ago
Other questions:
  • The problem of using IP numbers for addressing hosts in the Internet are resolved using
    5·1 answer
  • Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school
    15·1 answer
  • Security awareness training can reduce the risk of a data breach by what percentage?
    12·1 answer
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm
    8·1 answer
  • 4. What two important events occurred early in the formation of the universe?
    8·1 answer
  • What was used to enhance silent films of the early 1900s
    15·1 answer
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • What is computer specification
    15·1 answer
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!