1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
5

A computer consists of both software and hardware. a)Define the term software​

Computers and Technology
1 answer:
Anastasy [175]3 years ago
6 0

Answer: We should first look at the definition of the term software which is, “the programs and other operating information used by a computer. Now looking at this we can break this definition down. Software, are instructions that tell a computer what to do. Software are the entire set of programs, procedures, and routines associated with the operation of the computer. So pretty much to sum it up software is the set of instructions that tell the computer what to do, when to do it, and how to do it.

Have a nice day!

You might be interested in
Designing the right elements for the tasks that the user is attempting to perform is called ________.
skelet666 [1.2K]

Answer:

Interface design

Explanation:

INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.

6 0
3 years ago
What is the name of a statement written to retrieve specific data from a table?
Shkiper50 [21]
The answer is b.record
4 0
3 years ago
Jenifer wants to add some more hardware to her computer system. If she is adding a video card and a sound card, what must she us
ruslelena [56]

Answer:OA

Explanation:  expansion slots, the cards need to slide into the slots to become installed in the back of her pc.

3 0
1 year ago
An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me
shusha [124]

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

8 0
2 years ago
A ____________ is malware that copies itself repeatedly, using up system resources and slowing a system or device until it hangs
kicyunya [14]

Answer:

worm

Explanation:

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

3 0
3 years ago
Other questions:
  • What might happen if a computer has too many applications running at one time?
    15·1 answer
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • What are the tasks of a doc file
    15·1 answer
  • Implement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the intege
    11·1 answer
  • The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
    12·1 answer
  • A bookstore owner wants to allow customers to pay for books using their mobile phones. Which version of iOS will support the boo
    9·2 answers
  • Chloe is creating the software requirements specifications (SRS) for a project. The project is a web app that allows students to
    12·1 answer
  • Def shared_motif(dna_list):
    13·1 answer
  • If you need any answer answered faster check out Wolframalpha.com
    14·2 answers
  • In ipv4, datagram fragment might be fragmented again at the next router. re-assembly of these sub-fragments is handled by?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!