1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
5

Which one of the following items is an example of software?

Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
5 0
Printer is the software
You might be interested in
List and the deference between MS access objects​
Dafna11 [192]

Answer:

MS access objects help the user list , information and designed reports .

Explanation:

MS access objects are create a forms, data base, tables,queries, and modules. There are many objects are following:-Tables, Forms,Reports, Queries.

Table:- These are objects used into a define and store the data,tables are contain the columns and the store of different data.

Form:- Form is the object that designed by the data input and control application queries or tables, forms are used in viewing records.

Reports:- Reports are the designed to the printing and calculating data,reports are used because data in read to easy format.

Queries:- Queries are provides that data from one or more table,you can define the update ,delete, insert, select data.

4 0
3 years ago
Berat wants to compare images of what the streets of New York City looked like one hundred years ago to now. Which of the follow
Vesnalui [34]

Answer:

I think the answer would be D.

7 0
3 years ago
Read 2 more answers
When comparing different biometric systems, one of the most important metrics used is called the _________, which represents the
Airida [17]

Answer:

Crossover Error Rate(CER)

Explanation:

Crossover Error Rate is an important metrics in the biometric systems.It is the value of FRR and FAR when the sensitivity is framed so that FRR and FAR are equal. The Crossover Error Rate(CER) is suitable for quantitative comparison of different biometric devices, applications or solutions.

8 0
3 years ago
You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
marshall27 [118]

Answer:

a. 6 bits

b. 1

Explanation:

Ans (a)

40 Characters need to be represent by binary coded Zebronian (BCZ) , So You will need 6 bits.

5 bits wold only give you 32 = 2 x 2 x 2 x 2 x 2 unique characters.

So 6 bits would allow you to represent 64 characters.

Ans(b)

BCD = Binrary Coded Decimal is very common in electronics, particularly it displays numerical data.

BCD Encodes each digit of a decimal number into 4 digit binary form.

Each decimal digit is indiviidually converted to oits binary equivalent

For Example : 146 , the decimal degits are replaced by 0001 , 0100 and 0110 respectively

Addition

1 0 = 10 is binary value of 2 2

+1 1 = 11 is binary value of 3 + 3

---------- -----------

1 0 1 5 Ans

Subtraction

1 1= binary value of 3 3

- 1 0 = binary value of 2 - 2

--------- -----------

0 1 1 Ans

6 0
3 years ago
Works in the public domain have copyright that are expired or abandoned true or false
amid [387]

Answer:

False

Explanation:

Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.

4 0
2 years ago
Other questions:
  • ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
    10·1 answer
  • Describe some advantages of a 64-bit versus 32-bit version of windows.
    9·1 answer
  • The calls radioed to patrol officers, or assignments given to police patrol units by 911 dispatchers, reveal the types of proble
    9·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed
    6·1 answer
  • How does this app work?
    11·2 answers
  • Write a function called printEvens that prints all the even numbers between 2 and 20, inclusive. It will take no arguments and r
    6·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • If anyone gotta ps4, i'm a 15 yr old female n if u wanna b frens, hmu :))
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!