1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
2 years ago
12

Identify five type of application software​

Computers and Technology
2 answers:
andreyandreev [35.5K]2 years ago
8 0

Explanation:

Word processors.

Graphics software.

Database software.

Spreadsheet software.

Presentation software.

Web browsers.

Enterprise software.

Information worker software.

ANEK [815]2 years ago
4 0
Application Software and Types of Application Software
Word processors.
Graphics software.
Database software.
Spreadsheet software.
Presentation software.
You might be interested in
Which part of the computer contains logic circuity which interrupts instructions from a program​
poizon [28]

Answer:

The control unit of the CPU contains circuitry that uses electrical signals to direct the entire computer system to carry out stored program instructions.

Explanation: The control unit does not execute program instructions rather, it directs other parts of the system to do so.

6 0
3 years ago
How many possible password of length four to eight symbols can be formed using English alphabets both upper and lower case (A-Z
Fynjy0 [20]

Answer:

In a password, symbol/characters can be repeated. first calculate the total

symbols which can be used in a password.

So there are total 26(A-Z),26(a-z),10(0-9) and 2(_,$) symbols.

that is equal to 26+26+10+2=64.

Total number of password of length 4:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64=16777216

Total number of password of length 5:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64*64=1073741824

Similarly,

Total number of password of length 6:

64*64*64*64*64*64=68719476736

Total number of password of length 7:

64*64*64*64*64*64*64=4398046511104

Total number of password of length 8:

64*64*64*64*64*64*64=281474976710656

Hence the total number of password possible is:285,942,833,217,536

7 0
3 years ago
Taking these steps will help to improve the delivery of your presentation.
NNADVOKAT [17]

Taking any/all of these steps will help to improve the delivery of your presentation:

<em>==> Be familiar with the place the presentation will be given.</em>

<em>==> Practice your presentation.</em>

<em>==> Move away from your computer frequently while speaking, and return to it to advance slides.</em>

<em>==> Use your conversation words and voice.  Don't read it from a paper (unless you can write in conversational words and phrases, but this is really hard to do).</em>

<em>==> Look around the audience while you're talking.  Make eye-contact with people. </em>

<em>==> Let your hands move normally while you talk.  Smile.</em>

-- Read from your slides so you don't forget your content.   ==> No. This is considered one of the signs of a poor presentation, and an inadequately prepared presenter.  

You're not there to read the slides to your audience.  They can read the slides just as well as you can.  You're there to explain, embellish, enhance, and enlarge the material on the slides.  If you don't have any more to tell them except what's on the slides, then you don't even need to drag yourself or the audience through the agony of the presentation. Just print the slides onto a handout, hand it out, dismiss the audience, and take the rest of the day off.  

Also, you're expected to know your subject well enough so that you don't need to read your slides to know what you're talking about, and to be well enough prepared to remember what comes next.

5 0
2 years ago
Read 2 more answers
If Count = 1 and X = 3, what will be displayed when code corresponding to the following pseudocode is run? Do Set Y = Count + X
kirill115 [55]

Answer:

4 5 6

Explanation:

Since there is a do-while loop, you need to check the values for each iteration until the condition (Count <= X) is not satisfied.

First iteration ->  Count = 1 and X = 3, Y = 1 + 3, Write Y -> 4

Second iteration ->  Count = 2 and X = 3, Y = 2 + 3, Write Y -> 5

Third iteration ->  Count = 3 and X = 3, Y = 3 + 3, Write Y -> 6

After the third iteration count is equal to 4 and X is equal to 3. That is why loop ends.

3 0
3 years ago
Write a program that produces the following output (where the user may enter any positive integer under 10):______
Mekhanik [1.2K]

Answer:

// The Scanner class is imported to allow the program receive user input

import java.util.Scanner;

// The class is defined called Solution

public class Solution {

   // The main method is defined which begin program execution

   public static void main(String args[]) {

     // Scanner object 'scan' which receive user input from the keyboard

     Scanner scan = new Scanner(System.in);

     // the userInput variable is initially set to 1 (true) to allow the program continue prompting the user for input

     int userInput = 1;

     // while loop which continue execution as long as the userInput is greater than 0 and less than 10

     while (userInput > 0 && userInput < 10){

         // Prompts is displayed to the user to enter number below 10

         System.out.println("Enter a positive integer under 10:__________");

         // the next input is assigned to userInput

         userInput = scan.nextInt();

     }      

   }

}

Explanation:

The above code continue prompting the user to input an integer as long as the input is greater than 0 and less than 10.

3 0
3 years ago
Other questions:
  • A network administrator has statically configured the LMI type on the interface of a Cisco router that is running Cisco IOS Rele
    7·1 answer
  • The component that allows you to make a paper-based copy of a body of text is the _____.
    12·1 answer
  • How do you add a PDF assignment to google docs and be able to edit it?
    13·1 answer
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
    15·1 answer
  • When changing lanes on an expressway signal your intentions and?
    8·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    11·1 answer
  • Which command would you use to swap the words hither and yon on any line with any number of words between them? (You need not wo
    5·1 answer
  • According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.
    12·1 answer
  • Write a program to check the password( qbasic)​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!