1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
4 years ago
14

Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio

n
Computers and Technology
2 answers:
defon4 years ago
3 0
A is the answer for this question
s2008m [1.1K]4 years ago
3 0
A is the best answer

You might be interested in
Which of the following is not a use of a hash function
soldi70 [24.7K]

Answer:

the answer would be there

Explanation:

7 0
3 years ago
Change the function definition for myint so that xyzfunc uses the same memory locations for myint as in the calling program.
sattari [20]

Answer:

b) void xyzfunc (int &myint);

Explanation:

To use the same memory location as the variable in the calling function we have to pass the variable by reference means passing the same address to the function.So to do that we have use & operator which stands for address.

We will do this as following:-

void xyzfunc (int * myint);

Hence the answer is option b.

8 0
3 years ago
"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer
ExtremeBDS [4]

Answer:

The Session layer (Layer 5)

Explanation:

The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;

i. Layer 1 or the physical layer

ii. Layer 2 or the data-link layer

iii. Layer 3 or the network layer

iv. Layer 4 or the transport layer

v. Layer 5 or the Session layer

vi. Layer 6 or the presentation layer

vii. Layer 7 or the application layer.

Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.

8 0
3 years ago
Question 11 of 20
asambeis [7]

Answer: A.) To convince your manager to use a new meeting organization tool

Explanation:

4 0
3 years ago
You are consulting with another medium sized business regarding a new database they want to create. They currently have multiple
kompoz [17]

Answer:

The enormous amount of data and information that a company generates and consumes today can become an organizational and logistical nightmare. Storing data, integrating it and protecting it, so that it can be accessed in a fluid, fast and remote way, is one of the fundamental pillars for the successful management of any company, both for productive reasons and for being able to manage and give an effective response to the customers.

Good big data management is key to compete in a globalized market. With employees, suppliers and customers physically spread across different cities and countries, the better the data is handled in an organization, the greater its ability to react to market demand and its competitors.

Databases are nowadays an indispensable pillar to manage all the information handled by an organization that wants to be competitive. However, at a certain point of development in a company, when growth is sustained and the objective is expansion, the doubt faced by many managers and system administrators is whether they should continue to use a database system, or if they should consider the leap to a data warehouse. When is the right time to move from one data storage system to another?

4 0
3 years ago
Other questions:
  • Instructions:Select the correct answer.
    13·1 answer
  • List and define the types of System Software. How does System Software differ from Applications Software?
    12·1 answer
  • A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the atte
    14·1 answer
  • What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
    7·1 answer
  • . Write a swift programming code to perform following tasks a) Declare a variable that stores the age of a person b) Declare a c
    5·1 answer
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • I love the brainly update guys! :)
    5·2 answers
  • Which statement is most likely to be true about a computer network?
    12·2 answers
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    6·1 answer
  • Hey good to mett you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!