1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
3 years ago
10

Pllzzzzzzzz helppppppppp

Computers and Technology
1 answer:
Kaylis [27]3 years ago
6 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question has two questions, one is about student use of computer and the second is about the use of utility software by students.

A student owns a computer which he uses for:

a) producing project work in hard copy form - yes it is true, mostly students use the computer for producing work in hard copy (print) form. Fir they create work in soft-form such as word file etc. then take print of that file.

b) playing games with friends on the internet   : student also use their computers for playing games with friends on the internet, but it depends on student's hobby if he likes to play games with friends on the internet.

c) downloading video and music files : yes, student can also use their computer to download video lectures, movies and music files etc.

.....................................................................................................................................

He uses a number of pieces of utility software. State the purpose of each of the following types of utility software and describe how the student would use them.

(i) Compression software : students can use compression software to compress the electronic file and send over e-mail etc.

(ii) Anti-virus software : students can use anti-virus software for destroying viruses in the computer.

(iii) Backup utility: students can use the backup utility function to take the backup of their important data from the computer, if necessary.

You might be interested in
1) ( IBADE - 2020)A legislação que regula o uso da Internet no Brasil por meio da previsão de princípios, garantias, direitos e
VARVARA [1.3K]
C) Lei da Regulação Digital :)
6 0
3 years ago
Why is it difficult to detect a Trojan horse?
marishachu [46]

Answer:

Explanation:

Because the virus disguises it self as something you are trying to download, then it attackes your device

8 0
3 years ago
Read 2 more answers
One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
zlopas [31]
<span>One vital component of your professional behavior with regard to computing systems today is the creation of​ strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
3 0
3 years ago
Longer speeches should be separated into the paragraphs of:
Virty [35]

Answer:

b) About 100 words or 3-4 fines in the transcription tool.

Explanation:

Transcription tools are the software that helps in converting the audio or speeches into texts. Traditionally, the process of transcription was done manually. With teh advancement of technologies and software, transcription software is developed. They help in transcribing the audios and videos into texts. These are useful in many sectors of business, medical, and legal areas.

One of the rules of transcription involves the division of long speeches into paragraphs. It is advised to divide the paragraph into about 100 words or 3-4 lines.

7 0
3 years ago
When scanning the road, glance away from the road ahead for ___. A. At least one second B. No more than one second C. At least t
Marrrta [24]
A.At least one second
5 0
3 years ago
Other questions:
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    12·2 answers
  • Which part of a formal email is optional
    6·2 answers
  • 2. Use inheritance to create a hierarchy of Exception classes -- EndOfSentenceException, PunctuationException, and CommaExceptio
    6·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
    11·1 answer
  • What do developers do to support software products?
    5·2 answers
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • Sistem komponen mekanikal yang terdapat pada sebuah basikal?​
    13·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
  • 23. Convert the following to Megabytes<br> a) 2GB<br> b) 2056 Bytes-
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!