1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
4 years ago
7

Which from the following list are an example of productivity software?

Computers and Technology
2 answers:
Natali5045456 [20]4 years ago
5 0

Answer: a,b and c

Explanation:

Scorpion4ik [409]4 years ago
3 0
D. All of the Above.....
You might be interested in
APCPS B U10L12 exam (Connexus)
il63 [147K]

I don't know how to that i don't even know how to do my work

7 0
2 years ago
Suppose list is a one dimensional array of size 25, where in each component is of type int. Further, suppose that sum is an int
Varvara68 [4.7K]

Answer:

# include <conio.h>

# include <iostream.h>

using namespace std;

main{

int a[25], sum;

cout<<"enter the values in array a";

for (int i=0; i<= 24 ; i++)

{

cin>>a[i];

}

sum =0;

for (int j=0;  j<=24 ; j++)

{

sum= sum + a[j];

}

cout<< sum;

getch ();

}

5 0
3 years ago
Read 2 more answers
Computer gets bored very easily
Gelneren [198K]

Answer:

that is very interesting

Explanation:

5 0
2 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
lions [1.4K]

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

5 0
3 years ago
Marta, an art director, wants to give feedback to her graphic designer on his logo design. To be effective her feedback should b
Lana71 [14]

Answer:

B. Specific and provided during the construction of the project, and the end of the project.

Explanation:

The feedback have to be specific and provided during the construction of the project, and at the end of the project.

8 0
3 years ago
Read 2 more answers
Other questions:
  • I accidentally pressed the challenge button while I was scrolling through. I didn't mean to press that challenge, instead of the
    11·2 answers
  • The process of sending ping requests to a series of devices or to the entire range of networked devices is called a:
    9·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • C++ code pls write the code
    12·1 answer
  • During the preventive maintenance phase of a project involving a hydraulic power system, an engineer must change a gasket on a p
    14·1 answer
  • Is a system software that manages the hardware resources and provides services 5o the application software
    6·1 answer
  • Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
    12·2 answers
  • What is a common misconception about Agile and DevOps?
    9·1 answer
  • What is the most likely reason a company would use enterprise software?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!