Word processing program is an example of a software. All the others,
such as Printer, Keyboard and Mouse are examples of Computer peripheral
devices or in short hardware devices. Generally these listed hardware
devices come under input or output computer device category. Also, by
classic meaning in layman terms these hardware components can be touched
or felt. In contrast, a word processing program is a part of a computer
system that consists of data or computing instructions and provides the
mechanism to computer to perform a certain task utilizing it's hardware
resources. Such components of computer system which are written using
one of the computer languages are called computer software or software
programs or simply software.
Answer:
The Paragraph group on the Home tab contains commands to set and control several format options for a paragraph. The options include alignment, indentation, line spacing, and pagination. click Ctrl+J to justify. You can indent individual paragraphs so they appear to have different margins from the rest of a document.
Explanation:
comment an let me know how it helps
I asked my brother since he’s kinda of tech geek and he said
The 1st, 3rd, and 5th answers are correct
Hope this helps and I hope my brother is not wrong.
Answer: what type of software is an antivirus?
Answer: A security software
Explanation:
Antivirus software is a type of security software designed to protect users from multiple types of malware, not just viruses. The software is a risk management tool that scans devices regularly and on-demand for known malware and suspicious behavior associated with malware.
Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.