1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
7

_____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I

ntranet .c.Hardware .d.Extranet
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
8 0
Software, which contains coded information that is almost like instructions for your computer.
You might be interested in
Where is authorization management app on tablet?
Kryger [21]
I'm not sure, I don't have a tablet. Sorry
7 0
3 years ago
At age 16 Cheyanne just got her drivers license
ddd [48]

Answer:

i cant tell what you need

Explanation:

that is legal bc 16 is the legal age requirement

8 0
3 years ago
Read 2 more answers
Select the correct answers
Mashutka [201]

Answer:

Use a mixture of External and Internal Links....

Explanation:

8 0
3 years ago
George borrowed some equipment from his friend for recording his monologue for his art class. He got all the equipment except th
Kitty [74]

Answer:

Internal sound card

Explanation:

In this case, George has used an Internal sound card, this is enough to record a podcast, make and receive video conferences or play video games.

If we're going to use an instrument, an external sound card, it's necessary, but in this case, George can make the record with high quality audio.

If George wants to add an adapter to connect 6'35mm but is not the same quality that an external sound card.

6 0
3 years ago
[20 pts] Assume that Bob wants to send a secret message to Alice using RSA encryption. (a) [5pts] (Key generation step) Assume A
Kitty [74]

Answer:

a)Yes Alice can pick 11 has value for her public exponent e

b) The value of d when the public exponent e = 3 is 37

c) The cipher c of the Bob’s message m =2 is 8

d) The cipher c of the Bob’s message m =3 is 18

e) The value of m if c = 3  and the public exponent e = 7 is 16

Explanation:

Find attached the explanation

3 0
3 years ago
Other questions:
  • Which of these statements about cell references is NOT true?
    10·2 answers
  • _______ can be used to prevent busy waiting when implementing a semaphore.
    15·1 answer
  • Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volu
    11·2 answers
  • The Fibonacci numbers are the numbers
    15·1 answer
  • Which flooring option is most economical
    11·1 answer
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • Okay, guys, I know this one will be very hard however while trying to finish this assignment I got overwhelmed and lost by the s
    9·1 answer
  • Develop a stored procedure that will take a state abbreviation as a parameter and list the name of the state, vendor, and total
    9·1 answer
  • According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!