1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
8

Different computer applications and their uses.

Computers and Technology
1 answer:
sukhopar [10]3 years ago
5 0

Answer:

Application Software Type Examples

Word processing software MS Word, WordPad and Notepad

Database software Oracle, MS Access etc

Spreadsheet software Apple Numbers, Microsoft Excel

Multimedia software Real Player, Media Player

Presentation Software Microsoft Power Point, Keynotes

Explanation:

You might be interested in
HIGH POINTS!!! <br>List the creation date of each gaming console to exist.​
ANEK [815]

Answer:

Explanation:

The original Xbox: November 15, 2001

The original PS1: December 1, 1994

Xbox 360: November 22, 2005

Ps2: March 4, 2000

Ps3: November 11, 2006

Xbox One: November 22, 2013

Ps4: November 15, 2013

Nintendo Ds: November 21, 2004

Nintendo 3ds: February 26, 2011

Gameboy: April 21, 1989

Nintendo Switch: March 3, 2017

7 0
3 years ago
Why is it difficult to enforce laws against intellectual theft?
LiRa [457]

Answer:

A-because most of the victims of intellectual theft are individuals  

Explanation:

Its definitely the first, and not B., C, or D,

Countries are no barrier in catching the theft, as almost all the countries now have issued the online identification number of each of their citizens. However, some of them are in the process. Hence, for next one - two years we can add add the B as well:

B-because much intellectual theft is committed in other countries

However, as this work is complete, the B option will not be an issue related to intellectual theft analysis and control.

And  C and D are definitely not the part of the answer, as associations like FCC USA, Internet association etc  are technically sound enough, and quite good to fight a case under any law as well.

7 0
3 years ago
In this scenario, two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends deci
pickupchik [31]

Answer:

The java program for the given scenario is as follows.

import java.util.*;

import java.lang.*;

public class Main

{

   //variables for bill and tip declared and initialized

   static double bill=47.28, tip=0.15;

   //variables for total bill and share declared

   static double total, share1;

public static void main(String[] args) {

    double total_tip= (bill*tip);

    //total bill computed

    total = bill + total_tip;

    //share of each friend computed

    share1 = total/2;

    System.out.printf("Each person needs to pay: $%.2f", share1);  

}

}

Explanation:

1. The variables to hold the bill and tip percent are declared as double and initialized with the given values.

static double bill=47.28, tip=0.15;

2. The variables to hold the values of total bill amount and total tip are declared as double.

3. All the variables are declared outside main() and at class level, hence declared as static.

4. Inside main(), the values of total tip, total bill and share of each person are computed as shown.

double total_tip= (bill*tip);

total = bill + total_tip;

share1 = total/2;

5. The share of each person is displayed to the user. The value is displayed with only two decimal places which is assured by %.2f format modifier. The number of decimal places required can be changed by changing the number, i.e. 2. This format is used with printf() and not with println() method.

System.out.printf("Each person needs to pay: $%.2f", share1);  

6. The program is not designed to take any user input.

7. The program can be tested for any value of bill and tip percent.

8. The whole code is put inside a class since java is a purely object-oriented language.

9. Only variables can be declared outside method, the logic is put inside a method in a purely object-oriented language.

10. As shown, the logic is put inside the main() method and only variables are declared outside the method.

11. Due to simplicity, the program consists of only one class.

12. The output is attached.

5 0
4 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
What is the name given to software that decodes information from a digital file so that a media player can display the file? har
KiRa [710]

Answer:

plug-in

Explanation:

A Plug-in is a software that provides additional functionalities to existing programs. The need for them stems from the fact that users might want additional features or functions that were not available in the original program. Digital audio, video, and web browsers use plug-ins to update the already existing programs or to display audio/video through a media file. Plug-ins save the users of the stress of having to wait till a new product with the functionality that they want is produced.

6 0
3 years ago
Other questions:
  • What does utp stand for?
    11·2 answers
  • Instructions:Type the correct answer in the box. Spell all words correctly.
    14·2 answers
  • A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long fi
    13·1 answer
  • A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary stor
    11·1 answer
  • Design and implement a class called Sphere that contains instance data that represent the sphere’s diameter. Define the Sphere c
    6·1 answer
  • Write a CPP Program to read an integer number. Use a pointer to display this numbe
    5·1 answer
  • What is the gauge manifold made of
    14·1 answer
  • Write convert() method to cast double to int
    7·1 answer
  • A ______ is a portable device for recording audio and video.
    10·2 answers
  • How do you customize calendar view​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!