1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
13

Pls due soon

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
5 0

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:

You might be interested in
If your DTP document contains watermarks on every page, where can you place them?
QveST [7]

Answer:

<h3>You can place watermarks and other recurring elements on a DTP document by following the points below:</h3><h3 />
  • Open the DTP document on which watermark is to be placed.
  • Click on Page Layout tab
  • Locate the Page Background group and click it.
  • Select the Watermark Option and then select Custom watermark.
  • A box will open when you click the Text Watermark.
  • Type the text you want and click on Insert.
  • All other changes can be done using options.

<h3>I hope it will help you!</h3>

6 0
3 years ago
Akira has trouble reading what is on the computer screen and sometimes seeing pictures on websites. As her friend, you explain t
aliina [53]

1. Using Listener Software:

Software like Adobe reader allows you to listen to the stored files rather than reading them, Akira can use this software while she need to read a file or an article, simply copy the article in pdf file and turn on listener for it.

2. Zoom in/ Zoom Out:

Most of the browsers these days allow you to zoom in and zoom out the web pages while reading them by pressing Alt and + sign for Zoom in and Alt and - for zoom out. This feature can be really helpful for reading purposes and also for images view as well.

3. Narrators

When Akira is completely fed up with reading the screen, she can use Narrators which are programs that convert every text on screen into audio file and she can listen to them.

4.Color Changers

These days software like color changer are very useful for people with low vision eyes. They change the color of screen such that there is no irritation in eyes while reading articles. They can also be used by her.

7 0
4 years ago
The rules that establish an orderly transfer of data between sender and receiver are called ____.
zloy xaker [14]
Protocols               is the answer                        
8 0
3 years ago
Read 2 more answers
The code below uses the Space macro which simply displays the number of blank spaces specified by its argument. What is the firs
IceJOKER [234]

Answer:

Code explained below

Explanation:

Include Irvine32.inc

INCLUDE Macros.inc               ;Include macros for space

.code

main proc

  push 4                   ;Push 4 to the stack

push 10                   ;Push 10 to the stack

  call rcrsn                   ;call the function  

  exit

  ;invoke ExitProcess,0           ;After return from the function

                      ;call exit function

  main ENDP               ;end the main

  rcrsn PROC               ;define the function

      push ebp               ;push the ebp into stack

      mov ebp,esp           ;set ebp as frame pointer

      mov eax,[ebp + 12]       ;This is for second parameter

      mov ebx,[ebp + 8]       ;This is for first parameter

      cmp eax,ebx           ;compare the registers

      jl recurse           ;jump to another function  

      jmp quit               ;call quit

      recurse:               ;Implement another function  

      inc eax               ;increment count value

      push eax               ;push the eax value into stack

      push ebx               ;push ebx into stack

      call rcrsn           ;call above function

      mov eax,[ebp + 12]       ;This is for second parameter

      call WriteDec           ;write the value on the screen

      mWritespace 2           ;Space macro print 2 spaces

                      ;pause the screen

      quit:               ;Implement quit function

      pop ebp               ;pop the pointer value from the stack

      ret 8               ;clean up the stack

 

  rcrsn ENDP          

end main

6 0
4 years ago
In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
pishuonlain [190]

I guess the correct answer is class C network.

In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a class C network.

4 0
3 years ago
Other questions:
  • Which of the following is true of an enterprise search software? Select one:
    5·1 answer
  • Case Project 10-1 As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 empl
    8·1 answer
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • which of the following is not a windows accessory? a. sticky notes b. windows 8 c. sound recorder or d. paint
    8·2 answers
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    5·1 answer
  • BRAINLIEST !!A game design document is like a diary for game developers.
    11·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    11·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • He was called "The father of computing c_______ B_______​
    7·2 answers
  • What type of dns servers field dns queries, send iterative queries to upstream dns servers, or send requests to forwarders and t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!