Answer:
1. Spreadsheet software.
2. Word processor.
3. Database software.
4. Multimedia software.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, the various type of softwares used on computers to perform specific functions include the following;
1. <u>Spreadsheet software</u>: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.
2. <u>Word processor</u>: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.
3. <u>Database software</u>: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.
4. <u>Multimedia software</u>: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.
Answer:
c) Trojan horse
Explanation:
A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.
If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.
A trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.
A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance
Answer:
c.Writable domain controller.
Explanation:
To make changes in an active directory a writable domain controller.
Read Only domain controllers(RODC):- It is basically a server it responds to requests of security authentication and It hosts an active directory database's read-only partitions.
This is not the case with writable domain controller since it can make changes to the Active directory.