1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
11

Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro

grams, including those with traditional and ribbon graphical user interfaces.
Computers and Technology
1 answer:
LiRa [457]3 years ago
6 0

Answer:

General purpose programs are software that are designed for the general public, e.g. Word processor, music player, maps application. These softwares don't require you to be have some specific need or skill to use them.

Specialized programs are software that are designed for a specific group of users and/or profession, like CAD, Adobe premier, Visual Studio. These softwares require you to be associated with some profession to be able to use them. Also, specialized programs are usually not free and may require a licensing fee.

Common features of application programs include,

1. Saving file

2. Contact for help

3. Changing preferences

4. Exiting application

5. Viewing or signing in to your account

Explanation:

You might be interested in
2.5 code practice
Mamont248 [21]

Answer:

try declarimg smt before the int eg answer=int(input("your answer"))

7 0
3 years ago
// This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
Vikki [24]

Answer:

C++ code is given below

Explanation:

#include<iostream>

#include <cstring>

using namespace std;

int housekeeping(string EOFNAME);

int mainLoop(string name,string EOFNAME);

int finish();

void main()

{

  string name;

  string EOFNAME = "ZZZZ";

  cout << "enter the name" << endl;

  cin >> name;

  if (name != EOFNAME)

  {

      housekeeping(EOFNAME);

  }

  if (name != EOFNAME)

  {

      mainLoop(name , EOFNAME);

  }

  if (name != EOFNAME)

  {

      finish();

  }

  system("pause");

}

int housekeeping(string EOFNAME)

{  

  cout << "enter first name " << EOFNAME << " to quit " << endl;

  return 0;

}

int mainLoop(string name, string EOFNAME)

{  

  int hours;

  int rate,gross;

  int DEDUCTION = 45;

  int net;

  cout << "enter hours worked for " << name << endl;

  cin >> hours;

  cout << "enter hourly rate for " << name << endl;

  cin >> rate;

  gross = hours*rate;

  net = gross - DEDUCTION;

  if (net > 0)

  {

      cout << "net pay for " << name << " is " << net << endl;

  }

  else

  {

      cout << "dedections not covered.net is 0.";

  }

  cout << "enter next name or " << EOFNAME << " to quit" << endl;

  cin >> name;

  return 0;

}

int finish()

{

  cout << "end of job"<<endl;

  return 0;

}

3 0
4 years ago
Xcode, Swift, and Appy Pie are all tools for doing what?
joja [24]

Answer:

creating smartphone apps

Explanation:

Xcode, Swift, and Appy Pie are all tools for creating iOS applications.

These tools are used for app development in the iOS platform which is a rival to the Android platform.

They are used to build the apps from scratch, develop and test them,

4 0
4 years ago
Read 2 more answers
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
3.5.6 Introduce Yourself, Part 2<br><br><br> please hellllpp it keeps saying the code is wrong
dalvyx [7]

Answer:

In Python:

name = "Arthur"

age = "62"

print("Hi! My name is "+name+" and I am "+age+" years old")

Explanation:

Given

See attachment

Required

Write a code to introduce yourself

Initialize name

name = "Arthur"

Initialize age

age = "62"

Print introduction

print("Hi! My name is "+name+" and I am "+age+" years old")

3 0
3 years ago
Other questions:
  • Need answer quick
    9·1 answer
  • Once in debt, ________ is your companion every minute of the day and night, you cannot shun it or slip away from it . . . and wh
    10·1 answer
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • A project team was researching the risks involved in setting up a computer system. They decide to go ahead with their plan, rega
    7·1 answer
  • How do you leave a conversation or group text on iphone (ios 10)? Help!!
    5·1 answer
  • Function countValues = CreateArray(endValue) % endValue: Ending value of countValues
    7·1 answer
  • Which of the following is an approach to debugging?
    7·2 answers
  • When you check the spelling in a document, one of the options is to add unrecognized words to the dictionary. If you were workin
    8·1 answer
  • What is string literal in Java?
    5·1 answer
  • Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!