1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
9

________ provides the instructions that tell a computer what to do. Select one: A. Software B. Hardware C. Data mining D. Spam

Computers and Technology
1 answer:
pantera1 [17]3 years ago
5 0

Answer:A)Software

Explanation: Software is considered as the collection of the instruction in the form of set which is present in the operating system for giving the  command/instruction to perform the particular task.It is a program that run in the system for the functioning.It functions the input and output in the operating system.Therefore, the correct option is option(A).

You might be interested in
When we consider data quality, what are the differences among validity, reliability, and representativeness? How can you know th
MArishka [77]

Answer:

Validity is the degree to which the research measures what it has to measure. High validity = Proper Research Design.

Reliability is the measure to which research measurement techniques are free of error or mistakes. High realiability = Reasearchers know the sample fully understands the question asked.

Representativeness is the extent to which consumers in a study are similar to the larger group of interest. High representativeness = Sample is large and chosen in an unbiased way.

3 0
4 years ago
Which of the following statements is false?
GrogVix [38]

Answer:

bnnnnn A1

Explanation:

bnnnnnjm

8 0
3 years ago
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
Svet_ta [14]

Answer:

C. SQL injection.

Explanation:

SQL is a relational database that is used by websites and web applications to hold data needed in the application. websites or applications with relational database like SQL are prone to SQL injection attacks.

SQL injection attacks are used to run malicious SQL statement to take control of the databases run by a website or application. With the vulnerability, an attacker can modify the content of a website's SQL database or can retrieve all data from it, after bypassing the security.

The data transmitted to the website or application from the fields in the datasheet can be manipulated or modified.

3 0
4 years ago
How would I do this code with a while loop to remove the letters? Please and thank you
dusya [7]

There is of course a replace() function in java that lets you do this without a while loop. If you want to do it letter by letter, it gets a little complicated because you have to take care not to index the string outside its bounds.

I did not bother to create a separate runner class. The Main is just inside this class and everything is static.

public class LetterRemover {

   public static String RemoveLetters(String s, char c)

   {

       int loc = s.indexOf(c);

       while(loc >= 0)

       {            

           if (loc == 0) {

               s = s.substring(1);

           } else if (loc == s.length()-1) {

               s = s.substring(0, loc);

           } else {

               s = s.substring(0, loc) + s.substring(loc+1);

           }

           loc = s.indexOf(c);

       }

       return s;

   }

   public static void Test(String s, char c) {

       System.out.format("%s - letter to remove %c\n%s\n", s, c, RemoveLetters(s,c));

   }

   

   public static void main(String[] args) {

       Test("I am Sam I am", 'a');

       Test("ssssssssxssssesssssesss", 's');

       Test("qwertyqwertyqwerty", 'a');

   }

}

7 0
3 years ago
In a sql query, what operation takes rows from one table to create a new table?
melamori03 [73]
The SQL operation SELECT takes rows from one table to create a new table. 
8 0
3 years ago
Other questions:
  • The ____ is a single user, nonportable computer designed to perform engineering, cad, and software development work.
    9·1 answer
  • A _____ attack floods a network or server with service requests to prevent legitimate users’ access to the system.
    5·1 answer
  • PLEASE HELP!!!!!!!!!!!!!!!!!!
    6·1 answer
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • In order to create a horizontal 2-inch-thick dotted green line exactly 2 inches away from the top of the canvas, a graphic artis
    14·2 answers
  • Plz help
    14·2 answers
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • How do I send the face to the back? Seriously, I can't find out how...
    13·1 answer
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
  • Answer this pls ASAP
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!