1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
9

Name and describe the two (2) broad categories of files

Computers and Technology
1 answer:
fenix001 [56]3 years ago
8 0
If it’s computer files, that would be System Software and Application software.

“The System Software is the programs that allow the computer to function and access the functionality of the hardware. Systems software sole function is the control of the operation of the computer.

Applications software is the term used for programs that enable the user to achieve specific tasks such as create a document, use a database or produce a spreadsheet.”
You might be interested in
Instructions:Select the correct answer.
Luba_88 [7]
<span>A.) system administrator

Hope that helps</span>
8 0
4 years ago
Read 2 more answers
Write a while loop that prints 1 to user_num. Sample output for the given program: 1 2 3 4
Scorpion4ik [409]
Given 1234
i=1
user num=4#assume positive
while (user-num>=i);
print(i)
i+=1
#include <iostream>
using namespace std;
int main()
{int userNum=0;
int i=0;
userNum=4; ##assume positive
i=1;
while (i <=userNum){
cout<<i>>" ";
i=i+1;
cout <<endl;
return0;
}
6 0
4 years ago
Read 2 more answers
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
Which section is optional in a résumé?
Yuliya22 [10]

Answer:  

The answer is "Option B"

Explanation:

The resume is a summary detail of your abilities like educational details, achievements, etc. It is an "instantiate photo", of what you have to obtain an interview. In resume, except of career objectives, all component is important because, in career objectives, it describes the goal, that you have been established, and it is the remainder of your report reflects, and other options are correct, that described as follows:

  • In option A, It shows your previous work experience.
  • In option C, In case of an emergency, It is important.
  • In option D, It provides eligibility to crack any interview.
  • In option E, It describes, what you learn from your education
5 0
3 years ago
A network designer wants to run a 10 gigabit backbone between two switches in buildings that are 75 m (246 feet) apart. What is
stellarik [79]

The main consideration when selecting an appropriate copper cable is that:

At that given distance, one can use some kinds of shielded or screened cat 6A or one can use a cable which is said to be needed for the installation to be in line with Ethernet standard 10GBASE-T.

<h3>What are the types of copper cables?</h3>

Copper cable are known to often electrical signals to transmit data between some or a given  networks.

Note that there are three types of copper cable which are:

  • coaxial,
  • unshielded twisted pair
  • shielded twisted pair.

Copper is said to be a kind of electrical conductor in a lot of categories of electrical wiring and so The main consideration when selecting an appropriate copper cable is that:

At that given distance, one can use some kinds of shielded or screened cat 6A or one can use a cable which is said to be needed for the installation to be in line with Ethernet standard 10GBASE-T.

Learn more about gigabit from

brainly.com/question/14312073

#SPJ1

5 0
2 years ago
Other questions:
  • Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic
    11·2 answers
  • When talking about the physical elements of the internet, the term redundancy refers to:?
    13·1 answer
  • Consider the following method:
    8·2 answers
  • Which of the following is a category of social media?
    8·2 answers
  • To create a new folder, press ____.
    12·1 answer
  • It chapter 2 pennywise
    13·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • 35 POINTS
    10·1 answer
  • Brainliest
    13·2 answers
  • Which statement is accurate to describe a spreadsheet versus an Excel workbook?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!