1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
10

Plz answer me will mark as brainliest ​

Computers and Technology
2 answers:
Sloan [31]3 years ago
8 0

Answer:

Application

Explanation:

give the perso over me brainliest he said it first

victus00 [196]3 years ago
3 0

Answer:

Application

Explanation:

Application software comes in many forms like apps, and even on computers. The software is most common on computers of all kinds while mobile applications are most common on cellular devices.

You might be interested in
Assume that x is a string variable has been given a value. Write an expression whose value is true if and only if x is an hexade
Lady bird [3.3K]

Answer:

import string

all(c in string.hexdigits for c in s)

Explanation:

The hexadecimal number system, often abbreviated as "hex", is a numeral system which consist of 16 symbols (base 16). The standard numeral system we are all use to, called decimal (base 10) and utilizes ten symbols: 0,1,2,3,4,5,6,7,8,9.

Using python programming language

import the  string module

the second expression iterate through the digit in s and confirm if they all are within the rage of 0 -9 ad A -F. If yes , it returns True and else, it returns false

6 0
3 years ago
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP
Sav [38]

Answer:

D. Zero-day

Explanation:

It is clearly stated that the antivirus is still up-to-date on the workstation, and there has been no alterations to the firewall. Hence, this means the software is functional and up-to-date with all known viruses. This shows that this attack is unknown to the manufacturer of the antivirus software and hence no virus definition or patch fixing this problem has been developed yet. In this light, it is a zero-day.

A zero-day is a type of vulnerability in a software that is not yet known to the vendor or manufacturer, hence this security hole makes the software vulnerable to attackers or hacker before it is been fixed.

4 0
3 years ago
While building a high-end gaming system, you are attempting to install the EVGA GeForce GTX 1080 graphics card and discover ther
polet [3.4K]

Answer:

I will use a riser card to install the card parallel to the motherboard.

Explanation:

If you attempted to install a GPU like this and it stands tall, then this means that you do not have enough room for the card. Instead of purchasing a new case that will allow the GPU to seat comfortably, you can buy a riser card. A riser card seats at a right angular position and is built to extend a motherboard slot. I expect a motherboard that supports an EVGA GeForce GTX 1080 graphics card to support a riser card because not all boards support a riser card. Once it is installed, the card will rest on the motherboard and will rotate the GPU to seat parallel with the motherboard.

5 0
3 years ago
List 2 advantages Cryptocurrency have over regular bank transactions
ratelena [41]

Answer:

low transaction fees and speedier processing

Explanation:

5 0
2 years ago
Read 2 more answers
What is the first step to creating a PivotTable?
lara31 [8.8K]

Answer:

Click anywhere in the dataset

Go to Insert –> Tables –> Pivot Table.

In the Create Pivot Table dialog box, the default options work fine in most of the cases.

click ok

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What would be a situation in which you could use an excel chart to present your data
    8·2 answers
  • Which of the following is likely the cause of the bass from a sound system rattling the windows on your car?
    11·1 answer
  • You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr
    12·1 answer
  • Select a cybersecurity career that interests you. Describe the job duties and identify the skills required to excel in that care
    15·1 answer
  • Characters used to control the position of the output on the screen or paper, to cause some action to occur, such as ringing a b
    10·1 answer
  • What are the three fundamental principals of mnemonics??
    6·2 answers
  • If you copy and paste from someone else's document (such as a website, a friend's paper, an instructor's solutions manual, etc.)
    15·1 answer
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
  • How do solar ovens track the sun as it moves during the day?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!