1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
15

Gustavo is completing his homework online. When he uses a computer, what converts the information he inputs into instructions th

at the operating system understands?
Computers and Technology
2 answers:
Sphinxa [80]3 years ago
8 0

Answer:

D. the application software

Explanation:

asdfjkl;

Otrada [13]3 years ago
4 0
I can not understand your question, about it. What is homework of Gustavo working in, Visual or Dev C++ with any language?
You might be interested in
What model involves the creation of data and process models during the development of an application
matrenka [14]

Answer:

Data modeling

Explanation:

Data modeling is a term used in computer or software engineering. It is a technique of creating a data model for an information system through unusual formal methods. It also involves the analysis of models during the development of an application. It is further divided into three places including:

1. Conceptual data

2. Logical data model

3. Physics data model

Hence, Data modeling is a model that involves the creation of data and process models during the development of an application

6 0
3 years ago
A function ________ contains the statements that make up the function.
mestny [16]

Answer:

A) definition

Explanation:

3 0
3 years ago
"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
pickupchik [31]

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

7 0
3 years ago
This is Tim’s first job. He is not familiar with how the Internet is used at the workplace. Match the applications of Internet u
Gala2k [10]

Answer:

A - 2

B - 3

C - 5

D - 4

E - 1

Explanation:

A. Virtual private network : 2

This is very useful when you have to work from home or visiting a client and need access to files/applications just like if you were at the office.

B. Email :  3

Yes, this is basically why the Internet was created in the first place.

C. Social networking sites : 5

Social networks are indeed a great marketing tool, allowing to target potential customers very precisely.

D. Search engines :  4

Yes, to find information about new products for the company, how the competitors are doing and so on.

E. Video and web conferencing:  1

Another great tool for employees working from home for example, or for employees located in an office at the other side of the country.

4 0
3 years ago
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
Other questions:
  • You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196
    6·1 answer
  • Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu
    5·2 answers
  • What is AI and its necessary types?
    6·1 answer
  • Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
    13·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • What values can represent a bit
    8·1 answer
  • Last bittttt of points
    8·1 answer
  • Pride Group of Companies is making tremendous profits in different categories of electronic goods. The group of managers have to
    12·1 answer
  • Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that she is designing. What stat
    5·1 answer
  • Which of the following rules need to be followed when using variables?<br> Choose all that apply.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!