1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
15

Give 5 uses of software and hardware.

Computers and Technology
1 answer:
Annette [7]3 years ago
7 0
Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page is computer hardware. The Internet browser that allowed you to visit this page and the operating system that the browser is running on is considered software.

All software utilizes at least one hardware device to operate. For example, a video game, which is software, uses the computer processor (CPU), memory (RAM), hard drive, and video card to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents.

In a computer, hardware is what makes a computer work. A CPU processes information and that information can be stored in RAM or on a hard drive. A sound card can provide sound to speakers and a video card can provide an image to a monitor. All of this is hardware.

You might be interested in
Which statement best describes when Variable Substitution (expansion) can occur?
Leona [35]

Answer: d) B & C

Explanation: Variable substitution is the method through which the command substitution is done for the other form of command and regains its value or meaning.

This value substitution is done with the help of double quotes("...") which are inverted as well when a new form of command is to be introduced and it is   known as back quotes. Other given options are incorrect because it is not determined in single quotes.Thus the correct option is option (d).

3 0
4 years ago
Read 2 more answers
Multiple Intelligence Theory explains that...
Alex

Answer:

A. We all learn differently (edge 2020)

Explanation:

4 0
3 years ago
Read 2 more answers
408 request timeout your browser didn't send a complete request in time
Alik [6]
<span>408 Request Time out error messages are often customized by every website. These messages are especially for large websites that take long time to process itself.
</span>
<span /><span>Causes for these messages:
The 408 Request Timeout error is an HTTP status code that says that your request is not send to the server in the given time. In other words, your website connection is “timed out”
</span>


6 0
4 years ago
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting p
Romashka-Z-Leto [24]

Answer:

Cloud access security brokers

Explanation:

Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.

It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.

7 0
3 years ago
Other questions:
  • Can your computer become infected with a virus via email
    6·1 answer
  • What should you do if a dialog box covers an area of the screen that you need to see?
    10·2 answers
  • The average and distribution of properties, like orientation or color, over a set of objects or a region in a scene are called t
    12·1 answer
  • Wyjaśnij w kontekście bezpieczeństwa, dlaczego wykonanie przelewu bankowego nie w każdej sytuacji wymaga zastosowania kwalifikow
    12·1 answer
  • . File systems do not maintain the attributes associated with the files. Select one: True False
    13·1 answer
  • A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ a. ​ technical
    8·1 answer
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • What social media profession entails determining how and in what way an organization will create and maintain a social media pre
    7·1 answer
  • Um ok that makes sooo much sence
    11·2 answers
  • 2. Write the pseudocode to print all multiples of 5 between 10 and 25 (including both<br> 10 and 25)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!