1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
14

What are the three basic classes of application

Computers and Technology
2 answers:
tangare [24]3 years ago
6 0

Answer:

Word processing software, database software, and communication software.

Explanation:

Lady bird [3.3K]3 years ago
5 0

<u>Answer:</u>

<em>Types of applications are</em>

  • <em>Embedded Systems: </em>A small program kept inside mobile or other digital diaries.
  • <em>Windows applications which is also called Desktop applications:</em> Eg. Paint, office applications like word, power point, etc. You need require an internet connection.
  • <em>Web Applications:</em> An application which is accessed online.
  • <em>Web Services: </em>Provides services to other applications online
  • <em>Console applications: </em>Runs through the command prompt. It is a light-weight application which does not have any controls. It is a character used interface. This is not much user-friendly.
You might be interested in
Do you think that the TV set has outlived its utility as a household appliance? Research how convergence with internet technolog
kherson [118]

Answer:

What is Computer? & technology

7 0
2 years ago
-- of 5 points Question 3 1 try left While designing a new system, a company uncovered several processes that were quite rule-ba
Anna [14]

Answer:

B. robotic process automation.

Explanation:

In the design of a new system, a company was able to uncover several processes that were typically rule-based, and which did not really require staff to control or handle.

Hence, the company chose to automate those processes using robotic process automation so they would no longer need to assign people to perform those tasks.

4 0
2 years ago
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
oksian1 [2.3K]

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

5 0
3 years ago
(b) An online game allows players to race cars. They can play against other people or computer players.
BARSIC [14]

Answer:

Decomposition is when we break a problem down into smaller parts to make it easier to tackle.

Hope this helps I am in high school and I’m gonna work for Apple so I know a lot about computers and electronics

6 0
3 years ago
Substance abuse is an _____ coping mechanism.
hichkok12 [17]
Mental coping mechanism.
7 0
3 years ago
Other questions:
  • Write a function to add two large integers of any length, say up to 200 digits. A suggested approach is as follows: treat each n
    12·1 answer
  • What type of engineer works on cleaning up oil spills?
    8·2 answers
  • When seeking information on the Internet about a variety of subjects, the most
    7·2 answers
  • Visit the quick access toolbar to find help when looking for certain commands. True False
    15·2 answers
  • Define Indentation
    8·1 answer
  • When copying a pie chart from Calc or Excel to Impress or PowerPoint, once the chart has been pasted, it cannot be edited.
    15·2 answers
  • -(-13) P binary using signed. 2's complement representation
    11·1 answer
  • Assessment
    12·1 answer
  • Chose the term that matches each definition.
    15·1 answer
  • How many types of operating systems do we have as from 2010 till date​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!