1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
4 years ago
7

Examine these statements about computer software. Which one is false? a Computer software is a collection of coded instructions.

b Computer software is used in many organisations' activities. c A computer program may contain just a few instructions, or many thousands. d Computer software used to control a work cell is fundamentally different to business software.
Computers and Technology
1 answer:
Gnesinka [82]4 years ago
7 0

Answer:

d Computer software used to control a work cell is fundamentally different to business software.

Explanation:

A computer software used to control a work cell is not fundamentally different from a business software. They are different in terms of what they do or the problem they solve or different coded instructions that the computer executes for each of them or maybe different computer languages and hardware requirements. However they are not different fundamentally as they are both computer programs that are based on computer algorithms and code languages or instructions that the computer executes to solve a particular problem.

You might be interested in
If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices?
Gnesinka [82]

Answer:

c. 2

Explanation:

As the routers are only involved with the process of finding the best route to reach an IP address (the destination hosts), they don't look at the IP Datagram payload (which includes the transport protocol header), only to IP header.

So, the only transport processes that "talk"each other, are the one on the source host (defining TCP or UDP source port/s, and the other  on the destination host (defining TCP or UDP destination port/s), so two applications (or more) in both machines can exchange data.

5 0
3 years ago
What does it mean to “declare a variable”? create a variable use a variable share a variable modify a variable
lara [203]

You are defining the variable

6 0
3 years ago
Read 2 more answers
Corinne is taking a chemistry class in college. A lab assignment asks students to track the melting point of ten different subst
Dmitrij [34]

Answer:

a spreadsheet

Explanation:

The data is of statistical type and is experimentally based. And hence, the spreadsheet is the best kind of software that can be used to register the record. And we can save 10 such experient results with the same format of tables on 10 different worksheets, and if we want we can adjust the readings of the 10 similar experiments at one time. And hence, we can quite effectively record as well as analyze this data on the spreadsheet. Hence, the spreadsheet is the correct option.

4 0
3 years ago
Which is a safe practice when online
Kay [80]

Answer:

I don't know if there are choices but these are couple that i think would be right. Don't give out personal info, have a complex password and don't give it out to anyone, don't click on random pop up adds, and use a firewall

Explanation:

7 0
3 years ago
Read 2 more answers
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
Other questions:
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • A field that will always have a unique value is
    15·2 answers
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • A conditional expression is normally expressed within the ___?___ or HAVING clauses of a SQL statement. (SELECT, ORDER BY, PARSE
    7·1 answer
  • In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
    12·1 answer
  • Which of these statements about symmetric key encryption is true? The file is encrypted with a private key and can be decrypted
    14·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • The method used to transfer information to far off place instantly is called​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!