1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
9

Discus four importance of applications software​

Computers and Technology
1 answer:
AlladinOne [14]3 years ago
6 0

Answer:

l hope this helps Good luck.

You might be interested in
In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
spayn [35]
Hello <span>August1859 
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.

Hope This Helps!
-Chris
8 0
3 years ago
The users, groups, and roles that have access to a server are called ______________________________.
ElenaW [278]

Answer:

With the Exclusive Lock, a data item can be read as well as written. Also called write lock. An exclusive lock prevents any other locker from obtaining any sort of a lock on the object. They can be owned by only one transaction at a time

Explanation:

8 0
2 years ago
What type of media is a hard disk​
anyanavicka [17]

Answer:

A hard disk provides a high-capacity alternative to magnetic storage media. It contains metal platters coated with a magnetic layer. The platters usually spin continuously when a computer is on, storing data in different sectors on the magnetic disk.

Explanation:

5 0
3 years ago
What is Brainly?<br><br> A.Yes<br> B.No
mr Goodwill [35]

Answer: C: Yesn't

Explanation:

3 0
3 years ago
Read 2 more answers
What is the basic unit for storing data in exel
PtichkaEL [24]
A cell is the basic unit for storing data in exel
7 0
3 years ago
Other questions:
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • A computer program that senses when another computer is attempting to scan or access a computer or network is called an
    7·1 answer
  • How can you create the first row of the table as the header of the table?
    14·2 answers
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • What do the following standards cover?
    7·1 answer
  • A disk takes 1 ms per track seek time, and the head is currently on track 70. Assume it takes 5 ms to service a request once the
    10·1 answer
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • Why computer literacy is vital to access in business work
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!