1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
7

General purpose application include all the following except

Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
8 0

Answer: Web authoring

Explanation:

Here's the complete question:

General-purpose applications include all of the following except:

Select one:

a. web authoring

b. word processors

c. spreadsheets

d. database management systems

General purpose application refers to the application which can be used for different tasks. Examples of General purpose application are Spreadsheet, Word processors, Presentation software, Database management system etc.

The general purpose applications are quite different from the specialized application which focuses on a particular discipline. Therefore, the option that isn't a general purpose application is the web authoring.

You might be interested in
If you “bury” a story on Digg, what have you done
Whitepunk [10]
The correct answer for this question is this one: Digg has the bury function for a legitimate reason, which is to help combat spam.  If you “bury” a story on Digg, then you have done something that is not safe for security, most especially from the spam (emails, etc.) Hope this helps answer your question and have a nice day ahead.
3 0
3 years ago
Recommend how could you integrate positive aspects of digital literacy into your own
babymother [125]

Answer:

please give me brainlist and follow

Explanation:

7 Ways to Teach Digital Literacy

Emphasise the importance of critical thinking. ...

Use social media for learning and collaborating. ...

Provide guidance on how to avoid plagiarism. ...

Teach students to manage their online identity. ...

Help students manage digital distractions. ...

Provide authentic contexts for practice. ...

Guide students out of their comfort zone.

7 0
2 years ago
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
When creating a presentation you should use a blank as a starting point?
Lera25 [3.4K]
A blank presentation is recommended as the starting point when creating a PowerPoint presentation.  PowerPoint <span>lets you change the appearance, layout and content of your presentation at any time. Starting with a blank presentation lets you experiment more easily with the many features this program offers.</span>
6 0
3 years ago
What are the top and side margins for a letter typed in standard format?
BabaBlast [244]
Should be 1’ on each side
4 0
3 years ago
Other questions:
  • What is computer? Explain the characteristics of computer.<br>​
    12·1 answer
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • In Java Write a program that prompts the user for a name (any String value would work for testing), and print a hello message to
    15·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • If you do not specify any criteria in a delete query, Access will delete all the records in the table. Truth or False
    11·1 answer
  • Who invented Leibnitz calculating machine ?
    12·1 answer
  • In C language. Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printe
    5·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
  • Why does python code generate fewer types of syntax errors than code in other programming languages?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!