1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
3 years ago
7

What is the computer software? Does a hardware can work without software?

Computers and Technology
2 answers:
mr Goodwill [35]3 years ago
7 0

Answer:

Hope this helped!

Explanation:

A computer software is anything that lets you work with computers what happens inside it, and hard ware is the actual computer and its parts, so no a computer hardware CANNOT work without a software.

kozerog [31]3 years ago
3 0

Answer:

computer software is the collection of data or computer instructions that tell computer how to work.

Hardware and software are interconnected to each other, with software the hardware of computer wouldn't have any function.

You might be interested in
Brenda wants to finish her presentation with a summary slide . She wants three key messages to appear on each of the photo clips
Sav [38]

Brenda can first include an image and then include text. Lastly she can just provide an enhanced effect to the text to appear one by one each photo clip.

4 0
3 years ago
Read 2 more answers
You have just been named Director of Data Administration of General Hardware Co. General Hardware maintains a large central IS o
Afina-wow [57]

Answer:

Since General Hardware has a "huge, central IS organization," this organization ought to incorporate the two data administration and database administration departments.

The data administration department will be required to deal with the full scope of data administration duties regarding the whole corporation, both at the central station and at the local offices.

The central database administration department will give the standard operational database administrations for the home office databases.

It will likewise give direction and coordination to the individuals at the provincial offices who are answerable for their databases.

Obviously, database administration will likewise be answerable for the daily data downloads alluded to.

Data administration and database administration will increase the value of the corporation by making arrangements for and overseeing data as a corporate asset with the objective of increasing an upper hand from it.

Explanation:

5 0
3 years ago
Convert<br> 0.625 to binary
Anastaziya [24]

\huge{ \rm{Question:}}

Convert

0.625 to binary

\huge{ \rm{Answer:}}

Translate 0.625 into a fraction. We all know that 0.5 is ½. We know that the remainder, 0.125, is ⅛. Add them together, and you get ½ + ⅛ = ⅝.

Now, in binary, the positions to the right of the point are , which is ½, ¼, and ⅛ respectively.

⅝ is 5 × ⅛. 5 in binary is 101. So, ⅝ is

= 0.101

8 0
2 years ago
Plz plz plz subsribe to my channel, CookieFunTime
Anastaziya [24]

Answer:

Sure

Explanation:

5 0
2 years ago
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
Other questions:
  • Which of the following are examples of algorithms? (Select all that apply, if any do.)
    15·2 answers
  • Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111
    12·1 answer
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
    8·1 answer
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • Microcomputers, different from those giant mainframes and supercomputers, are designed for individuals. In fact, the microcomput
    7·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • The information given to you by your teachers is always accurate and should never be questioned. Please select the best answer f
    8·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • Can some one help me with this please
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!