1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
14

The two broad categories of software are

Computers and Technology
1 answer:
natita [175]3 years ago
3 0
The two broad categories of software are: system software and application software
You might be interested in
(I'm sorry that this question isn't school related, I can't find answers anywhere else)
Juliette [100K]
Because you have to explain how you got it
3 0
3 years ago
"A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to
Alexeev081 [22]

Answer: A central wireless access point (AP)

Explanation:

A central wireless access point (WAP) is a hardware device which can be configured on a local area network connecting WLAN to the wired network.

These APs have built in routers which enables wireless devices to connect with it. Mostly they are hardwired to devices such as in network switches or modems.

These access points are found in many institutions, organisations, enterprises which enables devices to be connected to them and provides access to the internet and resources.

There are also public access points which enables people travelling by public transport to connect through them and in many business organisation there are closed APs for use only by the employees of them which enables file sharing and information processing.

7 0
3 years ago
What are five don’ts of using a computer
Sonja [21]

Answer:

well, as long as there are no right or wrong answers, don't:

look to closely at the screen, as it may mess up your eyes

hold a drink above the computer, as it may spill and cause "sticky keys"

go to sites that you know will give your a computer a virus, cause they cost hundreds of dollars to repair, and some aren't able to come out

go on illegal sites/do illegal operations to the computer itself, because then you won't have a computer

Explanation:

3 0
3 years ago
Read 2 more answers
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
What is local technology ? give examples​
8090 [49]

Answer:

the technologynwhich is used in our locality os calleg local technology

ex. biogas farm , modern methods of 1transport etc

7 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • List at least three benefits of automated testing?
    13·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • All of the following are aspects of the search process except?
    6·2 answers
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • CLICK ME IF U DARE hehehe
    10·2 answers
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • SLA:
    14·1 answer
  • What is software? Why is it needed?​
    6·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!