1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
4 years ago
10

What is application software? A computer language for accessing data in a database. A character string used to identify the loca

tion and name of a resource on the Internet. A statement that accesses data in a database. Computer software designed to allow users to perform specific tasks.
Computers and Technology
1 answer:
Talja [164]4 years ago
5 0

Answer:

Computer software designed to allow users to perform specific tasks.

You might be interested in
Prove the following assertion: For every game tree, the utility obtained by MAX using minimax decisions against a suboptimal MIN
TiliK225 [7]

Answer:

From the given diagram, consider a MIN node whose children are terminal nodes, if MIN plays  

suboptimal. MIN will never be lower than the utility obtained playing against an optimal MIN  

MIN will always select a move having minimax utility greater than or equal to the move that is  

predicted by the minimax that is the MIN-played optimal value.  

Then the MIN node's value is increased to MAX. This is done by induction.  

One can do better than the minimax strategy, if the suboptimal play is predicted by MIN.

If MIN always falls for certain for certain kind of trap and losses, then setting up a trap guarantees a win.

Explanation:

See attached picture also.

5 0
3 years ago
"what command can be used on most linux distributions to find the directories where the man pages are kept"
BartSMP [9]

Answer:

Base name or -b command is used to locate only match directory in Linux.

Explanation:

base name can   primarily be used in shell script.

As we know that base name can be described  as a standard UNIX computer program. When we give a path name to any base then it  deletes each and every  prefix up to the last slash character and give back the result. base name can be defined in the Single UNIX Specification


6 0
4 years ago
HOW DO I DELETE A BRAINLY QUESTION?
Fantom [35]

Answer:

To delete a question you asked, click the arrow in the top right-hand corner of your question page and select Delete. If any answers have been added to your question, you'll have to request its deletion.Explanation:

8 0
3 years ago
Read 2 more answers
. Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more
mixer [17]

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

4 0
3 years ago
1. What power does creating your own variables give you that you wouldn't otherwise have?
IgorC [24]

Answer:

It gives the power of setting values and using them anywhere within the coding project without declaring them again.

Explanation:

What is a variable?

A variable is a name that a programmer gives to locations in a computer memory where values are stored and they need to be declared before usage.

Declaring a variable means that its data type must be defined and initial value set and creating your own variables gives the power of being able to set the variable once and use anywhere in the coding project without declaring it again.

4 0
3 years ago
Other questions:
  • What does the group on option do?
    10·1 answer
  • How many bit does four gigabyte has
    8·2 answers
  • Assume you previously entered these lines of code.
    14·2 answers
  • Is there a way to get back old messages that you didn't mean to delete??? I have a Samsung S5 and I really really need help. I d
    11·2 answers
  • Which cost of purchasing a franchise would you still have if you start your own business​
    12·1 answer
  • is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or av
    6·1 answer
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • Hello! I am a new coder, so this is a simple question. But I am trying to create a code where you enter a number, then another n
    8·1 answer
  • Why was the Internet first developed? Use details and information to explain your answer.
    6·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!