1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
12

Software, also called a(n) ____________________, consists of a series of related instructions, organized for a common purpose, t

hat tells the computer what tasks to perform and how to perform them.
Computers and Technology
1 answer:
Naddika [18.5K]3 years ago
8 0
Software is also called a program or an application.
You might be interested in
The second letter of the Koeppen letter code gives information about:
lukranit [14]

Answer:

a. the precipitation characteristics of the climate subtype.

Explanation:

The second letter in the code represents the detailed seasonality of precipitation, it shows when during the seasons precipitation comes to that climate.

6 0
3 years ago
What is 1 TB equal to ?<br> . 1024 kb<br> .1024 gb <br>. 1024 pb <br>. 1024 mb​
OLEGan [10]

\large \mathfrak{Answer : }

1 TB = 1024 GB

3 0
2 years ago
Read 2 more answers
What is the name of a statement written to retrieve specific data from a table?
Shkiper50 [21]
The answer is b.record
4 0
3 years ago
If two classes combine some private data members and provides public member functions to access and manipulate those data member
egoroff_w [7]

Answer:

c. Using public member functions to access and manipulate the data members

Explanation:

In object oriented programming, abstraction is used in order to lessen the complexity and hiding non essential details about how a program is actually working in the background. In order to achieve abstraction, classes are defined in such a way that the data members are hidden and the member functions form public interface. The public member functions here are used to access and manipulate these hidden or private data members. So the use of public member functions shows the abstraction here. These members functions are public so they can be directly accessed and the hidden or private data members can be accessed indirectly with the help of these member functions. So internal details of the classes and its data members are hidden from the outside world. Thus abstraction used here ensures security of data members of two classes and protects them from any accidental alterations by other parts of program.

5 0
2 years ago
The _____ hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.
Annette [7]

The <u>TCP</u> hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.

<h3>What is a TCP hijacking attack?</h3>

TCP is a term that connote the Transmission Control Protocol a communications standard that helps application programs as well as computing devices to pass messages over a network.

This hijack is known to be a kind of cyber attack where it is found to be an authorized user that tend to gets control to a legitimate linkage of another client in the network.

Note that by the hijacked of the said TCP/IP session, the attacker can be able to read and change transmitted data packets and thus,The <u>TCP</u> hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.

Learn more about <u>TCP</u> hijacking attack from

brainly.com/question/15052311

#SPJ1

4 0
1 year ago
Other questions:
  • How does the use of cloud computing affect the scalability of a data warehouse? a. Cloud vendors are mostly based overseas where
    6·1 answer
  • Which of the following is a category of social media?
    8·2 answers
  • Briefly explain what is net neutrality and why is it important today
    15·1 answer
  • The function below takes a string argument sentence. Complete the function to return the second word of the sentence. You can as
    5·1 answer
  • What method of the Math object can be used to return the largest value from the values that are passed to it?
    14·1 answer
  • Please answer <br><br> Steps 1-6 <br><br> Visual basics
    7·1 answer
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
  • ......... mi2hej<br><br>ejid8eo19o1b2bxhxjxjdnneejk2929nr
    5·2 answers
  • What is the expression for the resultant value of three capacitance where C1 connected in parallel​
    11·1 answer
  • WHATS 5X750 i really dont even know that questiob
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!