1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
7

What is the difference between a spreadsheet and word processing software?

Computers and Technology
2 answers:
Xelga [282]3 years ago
6 0

Answer:

Only one can calculate numeric data.

Explanation:

Both spreadsheet and word processing software can display graphs and chats.

Both spreadsheet and word processing software can organize data through cells and tables respectively.

Both spreadsheet and word processing software can present text and numeric data.

Arada [10]3 years ago
5 0

Answer:

Only one can calculate numeric data.

Explanation:

You might be interested in
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
Which of the following are examples of IT
Advocard [28]

Answer:

Computer hardware engineer

Systems analyst

Database administrator

7 0
3 years ago
Multidimensional arrays can be stored in row major order, as in C , or in column major order, as in Fortran. Develop the access
larisa86 [58]

Answer:

Access functions explained below

Explanation:

Access functions for Three Dimensional Arrays:

Let M, N and P refer to the size of the 1st 2nd and 3rd dimensions respectively.

Element_Size is the memory size the array element.

Generic access functions for Row Major:

If character data is used then Element_Size is 1.

For i=0 to P do

For i=0 to N do

  For i=0 to M do

     Address_of _array[i, j, k] = address_of_array[0,0,0] + (i * P + j * N + k) * Element_Size

    Store data into the Address_of _array[i, j, k]

    Or

  Display data from Address_of _array[i, j, k]

end

end

end        

Generic access function for Column Major:

if For i=0 to M do

For i=0 to N do

  For i=0 to P do

     Address_of _array[i, j, k] = address_of_array[0,0,0] + (i * M + j * N + k) * Element_Size

    Store data into the Address_of _array[i, j, k]

    Or

  Display data from Address_of _array[i, j, k]

end

end

end      

3 0
4 years ago
What tells the hardware what to do and how to do it?
oksano4ka [1.4K]

Answer:

I think its CPU

Explanation:

8 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • Need help with this C++ question
    5·1 answer
  • Which of the following is a reliable source of information: a book recommended from my professor, britannica, a blog, or wikiped
    6·1 answer
  • Create a single line comment that says ""Print results to screen""
    13·1 answer
  • How long would you need to work at McDonalds to earn enough money to buy a optiplex 3050, monitor, mouse and keyboard all from d
    7·2 answers
  • Which activity represents a violation of the licensing agreement?
    13·2 answers
  • You are having trouble cleaning your computer for a troublesome virus. you decide to try to clean your computer while in safe mo
    5·1 answer
  • Which of these colors is most likely to be outside the CMYK gamut?
    15·1 answer
  • 1. The opportunity to create several equations for launching program files is called
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!