1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
2 years ago
5

How Many types of application Software are there?​

Computers and Technology
1 answer:
aksik [14]2 years ago
4 0

Answer:

there are 2 types of application software

You might be interested in
During the conflict resolution process, which of the followings statements would be appropriate when defining the problem?
Mrac [35]
Maybe d




Idk for sure









6 0
3 years ago
Read 2 more answers
write an assembly language procedure that also performs the binary search. The C program will time multiple searches performed b
laiz [17]

Answer:

Let’s identify variables needed for this program.

First variables will be the one which will hold the values present in the Given Numbers in Array list and key of 16-bit and it will be array ARR and KEY. variables will be holding the Messages MSG1 “KEY IS FOUND AT “, RES ”  POSITION”, 13, 10,” $” and MSG2 ‘KEY NOT FOUND!!!.$’ to be printed for the User. Other variables will be holding Length of the Array and it will be LEN, So in all Six variables.

The identified variables are ARR, KEY, LEN, RES, MSG1 and MSG2.

DATA SEGMENT

    ARR DW 0000H,1111H,2222H,3333H,4444H,5555H,6666H,7777H,8888H,9999H

    LEN DW ($-ARR)/2

    KEY EQU 7777H

    MSG1 DB "KEY IS FOUND AT "

    RES DB "  POSITION",13,10," $"

    MSG2 DB 'KEY NOT FOUND!!!.$'

DATA ENDS

CODE SEGMENT  

   ASSUME DS:DATA CS:CODE

START:

     MOV AX,DATA

     MOV DS,AX

   

     MOV BX,00

     MOV DX,LEN

     MOV CX,KEY

AGAIN: CMP BX,DX

      JA FAIL

      MOV AX,BX

      ADD AX,DX

      SHR AX,1

      MOV SI,AX

      ADD SI,SI

      CMP CX,ARR[SI]

      JAE BIG

      DEC AX

      MOV DX,AX

      JMP AGAIN

BIG:   JE SUCCESS

      INC AX

      MOV BX,AX

      JMP AGAIN

SUCCESS: ADD AL,01

        ADD AL,'0'

        MOV RES,AL

        LEA DX,MSG1

        JMP DISP

FAIL: LEA DX,MSG2

DISP: MOV AH,09H

     INT 21H

     

     MOV AH,4CH

     INT 21H      

CODE ENDS

END START

In this Assembly Language Programming, A single program is divided into four Segments which are 1. Data Segment, 2. Code Segment, 3. Stack Segment, and 4. Extra  Segment. Now, from these one is compulsory i.e. Code Segment if at all you don’t need variable(s) for your program.if you need variable(s) for your program you will need two Segments i.e. Code Segment and Data Segment.

Explanation:

The attached Logic is a C like Program to conduct a binary search we need small Algorithm Shown above in a very simple way, So Just we will covert the logic into Assembly There are many things uncommon in the programing Language. There are No While Loops or Modules but this things are to be implemented in different ways.

6 0
4 years ago
Can some one please help me thank u.
masya89 [10]

Answer:

 A) self- evaluation

Explanation:

5 0
3 years ago
In a data dictionary, ____ is the maximum number of characters for an alphabetic or character data element or the maximum number
const2013 [10]

Answer:

length

Explanation:

<h2><u>Fill in the blanks </u></h2>

In a data dictionary, <u>length</u>  is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.

4 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • Apple Final Cut Pro is a digital video editing program that is available for Macs with OS X version 10.4 or later.
    7·2 answers
  • What is the only language a microprocessor can process directly but most programmers almost never write programs in this code?
    5·1 answer
  • Money left over after the bills are paid is referred to as
    10·2 answers
  • I need help with some computer stuff
    8·1 answer
  • Write the definition of a class Clock. The class has no constructors and three instance variables. One is of type int called hou
    12·1 answer
  • The technology dealing with robots is called
    6·1 answer
  • Please Help! <br> I need good Anime to watch!
    7·1 answer
  • Wyatt has a database to keep track of his enormous collection of videos. How can Wyatt find the details for the game Lost on Mar
    11·2 answers
  • Create a flowchart to print numbers from 1 to 100
    7·1 answer
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!