1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
3 years ago
15

Microsoft Word, Google Chrome, and Windows Media Player are examples of

Computers and Technology
1 answer:
Leni [432]3 years ago
5 0

Answer:

They are all examples of software.

You might be interested in
What are the main features cyber law of Nepal​
muminat

Answer:

What are the provisions of cyber law in Nepal?

Provision of cyber law of NEPAL

It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Hope this helps Have a good day

6 0
3 years ago
In the last two decades, how have cameras evolved?
Artist 52 [7]

Answer:

The Changes to Camera Technology over the last 70 years. The technology that the modern camera is based on was created several hundred years ago. ... The company would then reload the camera with new film and send it back to the consumer so they could take more pictures with it.

Explanation:

8 0
3 years ago
Read 2 more answers
Please help me with opinions, ideas, any websites that would help, or chart, article, video, or podcast to help support your pos
valina [46]

Answer:

Check explanation.

Explanation:

So, i will be going supporting positive effect of how the reshaping of of the media has affected the film industry. Since brainly do not support me to include links to websites and videos I will only be sharing my opinions on the subject.

One of the ways the media is been reshaped is through the platform known as the Social Networking Sites. This platform has helped people to create an account with them, create content on their sites and share this content. With the development of this platform the film industry can put their content on this platform and show it to the world. On platforms like this, the films can be viewed and shared to many individuals.

These Platforms are been employed by film makers/industry to disseminate their content and also for the generation of revenue.

7 0
3 years ago
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have
Norma-Jean [14]

Answer:

None of the mentioned options

Explanation:

  • If we define a method in a derived class with same declaration type as that of base class then it is said to be overriding a function which behaves differently which will depend on the object which is calling the method.
  • Option a,b and c are not any kind of methods we implement using coding.
  • Option d is done when number or data types of parameters are different than the declaration of the base type.

8 0
3 years ago
Other questions:
  • Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​
    6·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • Can you clone apps form your PC and to other PC?<br>Yes or No
    13·2 answers
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • 802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels d
    10·1 answer
  • The inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.
    10·1 answer
  • Use a while loop to output the even number from 100 to 147? This is python
    10·1 answer
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
  • 7.2.4 Area of Triangle HELP PLEASE!! (JAVA SCRIPT) I WILL WAIT FOR THE SOLUTION.
    12·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!