1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
12

Parts of a computer software

Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
4 0

Answer:

I think application software

utility software

networking software

You might be interested in
A software program that allows you to create professional looking multimedia presentations. Question 1 options: Excel 365 Word 3
maks197457 [2]

Powerpoint is a program that allows  us to create professional looking multimedia presentations.

<h3>What is Multimedia presentations?</h3>

A multimedia presentation is a way of communication where we use audio,vedio,arts,drawings and other various ways to present communcations.

<h3>Why Ms-PowerPoint ?</h3>

Ms-PowerPoint consists of some simple and understandable features to make notes through slides create vedio and vedio editing, Coral Draws Audio editing etc.

We can create banners,record vedios,draw and design with the help of tools provided by powerpoint.

Powerpoint also helps to transform boring presentation to an eye catching presentation.

Learn more about PowerPoint here:brainly.com/question/10117380

4 0
2 years ago
How does an ALU perform a logical operation? A. It compares two conditions. B. It compares two additions. C. It compares two mul
german
A.It compares two conditions
6 0
3 years ago
Read 2 more answers
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short pe
frutty [35]

Answer:

Guest account

Explanation:

When a consultant is accessing a network for a while and needs limited access to it, A Guest account should be given. This help keep your data and information save both now and in the future.

A guest account is an account with limited access and permission to a network over a specific period of time.

7 0
3 years ago
Which social networking function came first?
amm1812

D, Online bulletin boards.


♣Amaranthine
3 0
3 years ago
Read 2 more answers
Other questions:
  • If you want to prioritize downloads of your mobile app instead of visits to your mobile site, you should: a) add a sitelink exte
    10·1 answer
  • If you're able to understand directions more easily when you hear them instead of reading them you are most likely
    12·1 answer
  • The amount you pay your insurer for your insurance plan is which of the following?
    14·1 answer
  • A personal computer system is composed of the processing unit, graphics board, and keyboard with reliabilities of 0.976, 0.785,
    8·1 answer
  • You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo
    9·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • What is obtained after processing data?​
    8·1 answer
  • Major stress in your life can cause:
    11·2 answers
  • Draw algorithm and flowchart of multiply A and B​
    10·1 answer
  • Who tryna trade in gta my psn is xMadOrNawx-_-
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!