1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
11

What is Software? Write the functions of Software?​

Computers and Technology
1 answer:
Alecsey [184]3 years ago
4 0

Answer:

1. Allocating system resources: The system resources are time, memory, input, and output.

2. Monitoring system activities: The system security and system performance is monitored by system software.

3. File and disk management: The user needs to save, copy, delete, move and rename the files

You might be interested in
Which of the following formulas would you use to calculate the power requirements of an electrical load? 
Wittaler [7]
<span>Your Answer is c: P = E/R</span>
3 0
4 years ago
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
January 19/May 16 2022
fenix001 [56]

Answer:

This should get you started. Many things could be improved. You could keep adding layers to this program if you wanted to, so I wrote it with that in mind.

The new salary depends on the employee's department and current salary. I created a class that represents each employee. The function looks at the employee's current salary, and looks up what the employee's department raise will be (using the dictionary/hash table) before performing the calculation.

3 0
2 years ago
The development of various technologies led to many historic events. Use information from the Internet to describe one major his
kati45 [8]

Answer:

The Compass

Explanation:

The compass was one of the foremost technological inventions that forever changed sea navigation.

Before its invention, sailors used landmarks to navigate and when it got dark, they had to stop and wait for daybreak before resuming their journey. Some other people used the inaccurate means of the sun and stars to navigate at sea.

But with the invention of the compass, all these problems were a thing of the past because the compass could provide direction despite the weather or time of the day and as a result, it opened more trade routes and assisted in the Age of Discovery.

4 0
3 years ago
How do you validate the type of text that a user enters?
enot [183]
D, is the correct choice here. 
3 0
4 years ago
Other questions:
  • When a file has been opened using the 'r' mode specifier, which method will return the file's contents as a string??
    12·1 answer
  • You need to upgrade memory in a system but you don't have the motherboard documentation available. you open the case and notice
    9·1 answer
  • What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
    15·1 answer
  • Please design a Java GUI application with two JTextField for user to enter the first name and last name. Add two JButtons with a
    9·1 answer
  • What was the first video game ever invented
    11·2 answers
  • Do you get notified if someone follows you on Spotify like your email or do you just have to find out on your own
    14·1 answer
  • For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastruc
    7·1 answer
  • A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.
    13·1 answer
  • Can someone help me debug this please
    6·1 answer
  • which one of the following portfolios cannot lie on the efficient frontier as described by markowitz? portfolioexpected returnst
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!