1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
12

Identify five type of application software​

Computers and Technology
2 answers:
andreyandreev [35.5K]3 years ago
8 0

Explanation:

Word processors.

Graphics software.

Database software.

Spreadsheet software.

Presentation software.

Web browsers.

Enterprise software.

Information worker software.

ANEK [815]3 years ago
4 0
Application Software and Types of Application Software
Word processors.
Graphics software.
Database software.
Spreadsheet software.
Presentation software.
You might be interested in
What is it called when a programmer includes a step in an algorithm that lets
Oksanka [162]

Selection is the step in algorithm that let's the computer decide which group of steps to perform.

<h3>What is Algorithm?</h3>

This can be defined as set of instructions which are used for solving a problem or accomplishing a task.

Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.

Read more about Algorithm here brainly.com/question/11302120

3 0
2 years ago
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
Briefly describe the role of creativity and innovation to entrepreneurship​
prisoha [69]

Answer:

isia

Explanation:

Apooopooopeeepepe

8 0
3 years ago
Apps and applications are both software but have a number of significant differences
kipiarov [429]
Apps do a single function where applications do multiple functions
7 0
3 years ago
The audience, setting, and type of presentation help determine presentation content. True or False?
WARRIOR [948]

True. The audience is the key to the style of presentation and the content is led by the key to the topic. If the setting blends well with the audience age, gender, background, the presentation will be more effectively presented and positive, which will be more helpful to sell the audience to the point that is being made by the presenter.

6 0
3 years ago
Other questions:
  • How does microchip work
    12·1 answer
  • You can use the bash shell to redirect standard output or standard error from the terminal screen using the ____ shell metachara
    15·1 answer
  • A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company n
    9·1 answer
  • Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
    6·1 answer
  • ____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia
    9·1 answer
  • Beyond adding equations, what else does the Insert Equation feature allow users to do?
    7·1 answer
  • List five kinds of view in the computer and briefly define each​
    9·1 answer
  • The production team for a fictional drama is shooting a key scene. One of the actors leaves out part of his scripted dialogue th
    12·2 answers
  • Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attache
    15·1 answer
  • How do the following technologies help you with your quest to become a digital citizen kiosks enterprise computing, natural lang
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!