1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
12

What is the purpose of application software

Computers and Technology
1 answer:
Otrada [13]3 years ago
3 0

Answer:

Explanation:

type of computer program that performs a specific personal, educational, and business function. Each program is designed to assist the user with a particular process, which may be related to productivity, creativity, and/or communication.

You might be interested in
Write a short-essay discussing your own stand on social media usage for students.​
hjlf

Answer:

More than half of the world’s population uses the internet. This is highlighted by social media users increasing by 21% since 2015, with 2.8 billion users reported globally in 2017.

Humans are social animals. We always like to remain in some group or another, and we prefer to follow what this group does. All of our traditions and cultures are the product of <em><u>this</u></em> group-oriented facet of human nature.Everyone is connected to one another in this vast network generated by the Internet.It illuminates the lives of thousands of people by spreading knowledge internationally, thereby making us global citizens. 

<h2><em><u>NOT</u></em><em><u> </u></em><em><u>COPIED</u></em><em><u> </u></em><em><u>ANSWER</u></em><em><u> </u></em></h2>
3 0
3 years ago
I NEED HELP!!! BRAINLIEST!!!
Trava [24]

Answer:

DHCP Dynamic Host Configuration Protocol:

Is a network service that automatically assigns IP addresses and other TCP/IP configuration information on network nodes configured as DHCP clients. Server allocates IP addresses to DHCP clients dynamically. Should be configured with at least one DHCP scope. Scope contains a range of IP addresses and a subnet mask, and can contain other options, such as a default gateway and Domain Name System. Scope also needs to specify the duration of the lease and usage of an IP affects after which the node needs to renew the lease with the SHCP server. Determines the duration, which can be set for a defined time period or for an unlimited length of time.

DNS Domain Name Service: Is a TCP/IP name resolution service that translates FQDNs into IP addresses. System of hierarchical databases that are stored on separate DNS servers on all networks that connect to the Internet. DNS servers store, maintains and update databases, they respond to DNS client name resolution requests to translate host names into IP addresses.

DNS Components

DNS database is divided logically into a heieratchical grouping of domains. Physically into files called zones. Zone files contain the actual IP-to-host name mapping for one or more domains. Zone files is stored on the DNS server that is responsible for resolving hot names for the domains contained in the zone. Each network node in that domain will have a host record within the domain's zone files. Includes the node's host name, FQDN, and assigned IP address.

DNS Servers

*If you are configuring static IP addresses, including the IP address of the default DNS servers as you configure each client.

*If you are using DHCP, use the DHCP scope options to specify the IP Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following is an example of batch processing?
9966 [12]

Answer:

several personnel accessing the registration system

Explanation:

batch processing is all about multiprogramming so I think the first answer is the best as it is not based on one person .I know the last answer might be almost close but on a closer look it is not the answer as it is single based as written a file

7 0
4 years ago
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
The class ________ is the portion of a class that is visible to the application's programmer.
Lady_Fox [76]

The correct option to this question is class interface.

The class interface is the portion of a class that is visible to the application’s programmer. Class interfaces mean implementation of public methods of the class. These class interfaces of the class are easily visible to the application’s program either the one who is developing the application program or the one who is reading the application’s code.

Class interface can be seen by the other classes as its public face. Class interfaces separate the class’s implementation and its interaction with other classes. That way the implementation of the class can be modified easily without being known by other classes. Basically, the programmer who is developing the program, all the portions of the programm is visible to that programmer.

For example, the class is written below:

class class-name

{

private members;

public method()

{

//method defination

}

}

when the class object is created, the code of the object to the programmer is visible.

<u>While the other options are incorrect:</u>

  • Form: the form is used to collect information from the user. It can be build using front-end development tools
  • Design: Design is a term used in computer or software engineering to make something from scratch or beginning. It can be  methodologies, standards, or techniques etc.
  • Control: Control is the mechanism or a term used in software development to control the program or execution of the program.

You can learn more about class interface at

brainly.com/question/13089781

#SPJ4

The complete question is found while searching over internet:

"

<em>The class ________ is the portion of a class that is visible to the application's programmer.</em>

  • <em>Interface</em>
  • <em>Form</em>
  • <em>Design</em>
  • <em>Control </em>

"

7 0
2 years ago
Other questions:
  • Which of the following is NOT an ethical way of getting to the top of a web search?
    5·1 answer
  • PLS HELP ASAP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    15·1 answer
  • To easily add an organizational chart to a document, users should select _____. SmartArt Text Boxes Shapes Clip Art
    8·2 answers
  • the part of the computer that contains the brain , or central processing unit , is also known the what ?
    12·1 answer
  • Read the scenario below and then answer the
    14·1 answer
  • You must. place a child in a federally approved child restraint device. if the child is
    5·2 answers
  • A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
    5·1 answer
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • Where can formatting features be found ?! Need help asp !‍♀️
    9·1 answer
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!