1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
11

________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf

ormation system. Software programming enterprise applications business intelligence data management technology
Computers and Technology
1 answer:
Mrrafil [7]3 years ago
5 0

The answer is Software.  It consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.  It is a set of instructions and related documentation that tells a computer what to do or how to perform a task or it can mean all the software on a computer, including the applications and the operating system.

You might be interested in
Which are characteristics of pseudocode? Select all that apply.
jeka94

Answer:

A,B,C

Explanation:

3 0
3 years ago
Which C99 function can be used to convert a string to a double?
nordsb [41]

Answer:

atof

Explanation:

atof function is used to convert a string to a double.

It takes a single parameter of type const char * and returns a double value.

The function signature is: double atof (const char* str);

In order to use this function in the code, you need to include the header file <stdlib.h>

For example:

#include <stdio.h>

#include <stdlib.h>  

int main()

{

   char str[5] = "0.01";

   double d = atof(str);

   printf("Value = %f\n", d);

   return 0;

}

5 0
3 years ago
Which of the following best describes professional behavior in the IT field?
Liono4ka [1.6K]
Option A. is the correct answer the other three are not professional behaviour if you would like an explanation as to why they are not just comment
7 0
2 years ago
Read 2 more answers
The two types of one-time-password tokens are ______ and ______.
Nutka1998 [239]

Answer:

event based and time based

Explanation:

OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated

5 0
3 years ago
Read 2 more answers
Endnotes are indicated by
V125BC [204]

Answer:

The answer is D because u have the uppercase letter bold

4 0
2 years ago
Read 2 more answers
Other questions:
  • What key combination in excel takes you back to the first cell
    7·1 answer
  • If you want to have certain icons available regardless of what tab you're using, you should add them to the
    14·1 answer
  • The process of engineering design typically starts with what ?
    12·1 answer
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • The system restore utility can be started from command line using what executable?
    11·1 answer
  • You have been asked to report on the feasibility of installing an IP CCTV camera system at your organization. Detail the pros an
    5·1 answer
  • HELP PLEASE!!! I do online school, someone is in another state wanting to help me. No not do my work for me but view what I view
    6·1 answer
  • A production house needs an operating system that captures saves and generates information within a specific time. Which type of
    11·1 answer
  • A good practice when using public domain content is to
    7·1 answer
  • I made Pico with a Ray Gun (Next is Dad/Tankman)<br><br> Opinons?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!