1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
13

Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co

mputer software?
a. World Wide Web personal use and productivity software
b. Application software
c. Hardware coordination software
d. System software
Computers and Technology
1 answer:
inysia [295]3 years ago
8 0
<span>b. Application software 

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:
Microsoft Office Word, Excel, Powerpoint</span>
You might be interested in
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ladessa [460]

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

8 0
3 years ago
Which of the following creates a new table called 'game_scores' with 2 columns 'player_name' and 'player_score'?
DerKrebs [107]

Answer:

e

Explanation:

the valid sql syntax for creating table is

CREATE TABLE table_name (

column_name column_type

)

varchar and int are the valid sql types not string and integer

AS is used in select queries to aggregate results under given name

8 0
3 years ago
Guys plz help me :(
ra1l [238]
A. Customer classification since it's for improving
8 0
3 years ago
Read 2 more answers
Choose all of the items that accurately describe an operating system.
kodGreya [7K]
The first one, the 3rd one, 4th one and last one if I’m not mistaken
8 0
3 years ago
Read 2 more answers
Other questions:
  • ​ A wire service is also known as a ____.
    7·1 answer
  • A(n) _____ is a common output device for hard copy.
    9·1 answer
  • The array s of ints contain integers each of which is between 1 and 1000 (inclusive). write code that stores in the variable ord
    9·1 answer
  • 40 points!!! Which of the following is a disadvantage of outsourcing?
    9·2 answers
  • [17 PTS] What do you think of puzzle games?
    11·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • Write a program that reads two fractions such as 1/2 and 1/4 and computes and stores the sum, the difference, the product and th
    15·1 answer
  • Recall that the name of a transport-layer packet is segment and that the name of a link-layer packet is frame. What is the name
    12·1 answer
  • Which of these commands is found by default on the quick access toolbar 1)save 2)new 3)open 4)print
    10·1 answer
  • How to have grey font in java swing.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!