1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
3 years ago
13

Categories of general purpose application software and examples each​

Computers and Technology
1 answer:
avanturin [10]3 years ago
7 0

Answer:

These are the software that you use a lot at home and at school. They are cheap but free from the bug as they are thoroughly tested. And they are easily available as well. Various examples are:

Word processors - These are used to write the memos, letters, and reports. an example is Microsoft word.

Spreadsheet- keep track of accounts. example, Microsoft Excel, Google sheet.

Database application - Keeping track of customer's records. Example Microsoft Access etc.

Desktop publishers- for creating business cards, posters, etc. Example-Microsoft Publisher.

Presentation software - for creating presentations example, Microsoft Powerpoint

Applications for Graphics- for making changes to the images, like Corel Draw

Applications for Web design - creating business websites, and personal. example. Dreamweaver.

Explanation:

Please check the answer.

You might be interested in
Which of the following statements is true?
nignag [31]

Answer:

Option D is the correct answer.

Explanation:

6 0
3 years ago
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
Kaylis [27]

Answer:

Explanation:

We must follow several steps:

  1. We must click in the image
  2. Click Image Tools > Format
  3. Click the date under Crop
  4. We must resize the image, or Trim one side, Trim two adjacent sides, Trim the same fragment.
  5. Click the Crop button again if you finished

In addition, we can change the form of the image, we have a lot of options in crop to shape.

8 0
3 years ago
Read 2 more answers
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the nam
MatroZZZ [7]

Answer:

#include <iostream>

#include<string.h>

using namespace std;

void printCharacter(string name){

   for(int i=0;name[i]!='\0';i++){

       cout<<name[i]<<endl;

   }

}

int main()

{

   string name;

   cout<<"enter the name: ";

   cin>>name;

   printCharacter(name);

}

Explanation:

first include the two libraries iostream for input/output and string library for using the string.

then, create the main function and declare the variable type string.

cout instruction is used o display the message on the screen.

cin is used to store the value in the name variable.

after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.

4 0
3 years ago
To determine why a computer program started to function differently, Mel should most likely use data to
Amiraneli [1.4K]

Answer:

convince the software company of the issue

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Using Python
    14·1 answer
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their
    11·1 answer
  • Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the high
    12·1 answer
  • 1.Input device which transfers information and images from physical documents to computer files.
    14·1 answer
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!