1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
5

Please help meh T^T Which of the following describes an application error? Select 2 options.

Computers and Technology
2 answers:
Lena [83]3 years ago
8 0

Answer:

"Every time you try to run your new game, it crashes after displaying the opening screen"

"After a recent Windows update, you can no longer access the internet on your laptop"

Explanation:

BartSMP [9]3 years ago
3 0
Answer: 4 and 6 those are right
You might be interested in
Can Word Processing (WP) programs be used for DTP? Explain your answer
siniylev [52]

Word Processing Programs cannot be used for DTP

Explanation:

DTP software cannot be replaced with Word Processing Programs.  DTP software is used for creating publishing document like post card, business card, calendars, and books where as the word processing software is used for creating and editing predominantly text document and once can edit text, copy, paste , delete and format text. Word processor relies heavily on editing of the contents rather than graphics or page layout where as DTP software is used to create image heavy newsletters, magazines, adverts, and brochures where layout is important.

4 0
3 years ago
Float in is an example of a(n) _____. annotation, evolution, animation, simulation
Pavel [41]
Animation or C your welcome my friend
7 0
3 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
2 years ago
What is the part of a file, the .pptx, or .txt etc called?
Lunna [17]
It is called the file extension or filename extension. It is a suffix that indicates the file format.
7 0
3 years ago
Read 2 more answers
Kim agrees. You get the equipment from the truck and begin working. Kim approaches you as you are installing the modem and is a
Angelina_Jolie [31]
Ask your friends if they are doing something wrong with your friends and friends
6 0
2 years ago
Other questions:
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • What's the name of this apex legend hero​
    13·2 answers
  • Which of the following is an object-oriented prototype-based language? Java Pike REBOL MATLAB
    9·1 answer
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • This is a program that calculates information about orders of shirts and pants. All orders have a quantity and a color. Write a
    7·1 answer
  • What output is generated by this for loop?
    6·1 answer
  • Need the answer ASAP!!!
    14·1 answer
  • Write a public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbe
    8·1 answer
  • what is a program or collection of programs that enable a person to manipulate a visual images on a computer​
    14·1 answer
  • Posts that you delete
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!