1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
15

What is the general term for programs used to operate a computer

Computers and Technology
1 answer:
andre [41]3 years ago
7 0

Answer: SOFTWARE

Explanation: Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device.

You might be interested in
Which type of input devices used in big hero 6 movie
Maslowich

The  Input Devices Used in Movie Big Hero are:

  • A joystick
  • medical robot
  • Armored exoskeleton
  • Jet-boots.

<h3>What are input device?</h3>

This is known to be a is a piece of instrument that helps gives or provide data to any information processing system.

Note that the Input Devices Used in Movie Big Hero “6”  are  a medical robot made by by Tadashi Hamada., Armored exoskeleton and others.

Learn more about input device from

brainly.com/question/24455519

#SPJ1

7 0
2 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and g
Whitepunk [10]

Answer:

This is what I have so far

Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and give several specific examples. How do you make sure your ideas are original and not copied directly from other video games? Explain.

What inspires my personal creativity is all the indie games I have played in the past, and they have always amazed me with their design, video games have always been a part of me from the Mario games I played when I was little to AAA titles. My ideas are original because I’ve seen so much, that I know when something is unique and original.

Explain how the four-game mechanics mentioned in the unit (reward, risk/loss, levels, and feedback) could work together to create an interesting sports video game.

Every 10 levels is a new sport and each level is harder, but at the end of each level you earn money to buy better gear, (like a system from simple rpg,) but if you lose, you also lose money. Also, you would need to use feedback that you would get from players to improve the game.

You’ve learned that video games use rewards to keep players coming back for more. Can you think of an example in real life that uses rewards to keep people coming back for more? How is this similar to video game rewards? Explain.

When a person works 1 job for many years, they may get burnt out, but if they get a raise or a promotion every once and awhile, then they will be more motivated and come back for more. This is similar to games in a few ways, like if you play a single game for years, it will get boring, but if that game receives an update, then it will motivate people to play.

7 0
3 years ago
The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for ____ PC file systems.
netineya [11]

<u>The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for </u><u>IBM</u><u> PC file systems</u>. A file system is a structured representation of data and a set of metadata describing this data. The file system of the IBM supports stream input/output and storage management, providing a structure over all information stored in the system. A floppy disk consists of a thin plastic disk coated with magnetic material (it was designed by IBM in the early 1970s). A hard disk is fixed on the system unit. It is made up of several circular disks called platters. MS-DOS (Microsoft Disk Operating System) is a licensed operating system for use on microcomputers from various manufacturers.

6 0
4 years ago
1. Write a generic method that compares its 2 arguments using the equals method and returns true if they are equal and false oth
Ganezh [65]

Answer:

Explanation:

The following piece of code is written in Java. It creates the method as requested that takes in two generic objects and compares them using the .equals() built in Java method. This method will return True if the objects are identical or False if they are not. A test case is used in the code and the output can be seen in the attached image below.

   public static <T> boolean comparePerez(T a, T b) {

       return a.equals(b);

   }

5 0
3 years ago
Other questions:
  • The kitchen in any café is a noisy place. To make sure the orders which you have carefully written down on your notepad make it
    14·1 answer
  • Is there anyone willing to sign into my google classroom account and help with my work :( i had surgery on monday and have about
    14·2 answers
  • Technology can help governments handle economic emergencies, such as the reliance on automation. Crop and resource shortages. Th
    15·2 answers
  • Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
    11·2 answers
  • You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
    5·1 answer
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
  • In this line of code, what does 144 refer to?
    12·1 answer
  • Why do we need to know the different Networking Devices?​
    10·1 answer
  • (05.01 MC)
    7·1 answer
  • According to the selection, speech-software developers are still striving to develop speech-recognition technology that —
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!