1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
3 years ago
13

What is software?....​

Computers and Technology
2 answers:
serious [3.7K]3 years ago
7 0

Answer:

Software, instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. The term was coined to differentiate these instructions from hardware — i.e., the physical components of a computer system.

Explanation:

PA BRAINLIEST

HOPE ITS HELP

GOD BLESS

Alborosie3 years ago
6 0

Explanation:

Software is a set of instructions, data or programs used to operate computers and execute specific tasks.

AGAIN THANKS ✨✨

You might be interested in
You may already have friendships with some team members, but not everyone. How should you behave as a team member? (choose all t
aivan3 [116]

Answer:

now as a team member you should help all your teammates

this is how you become a group and gets close to each other

in start it is difficult but when you encourage your friends to talk and have fun with other members , the you will become an elite team member or an outstanding one , to me option D out  of all options because when you mingle with others that makes the team even funnier

5 0
4 years ago
Read 2 more answers
.When one component modifies an internal data item in anothercomponent we call this:
Lady bird [3.3K]

Answer:

A. content coupling

Explanation:

When one component modifies an internal data item in another component we call this content coupling.

5 0
3 years ago
What does % find on edhesive??
statuscvo [17]

Answer:

Explanation: What is that word you typed?

3 0
3 years ago
Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pr
jolli1 [7]

Answer:

Answer = a ig

wpa. ig ig ig ig

4 0
3 years ago
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests th
MatroZZZ [7]
The answer is Brute Force.  The <span>attack that involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file is Brute Force. 
</span>It is also known as brute force<span> cracking.  It is a trial and error method used to decode passwords or Data Encryption Standard (DES) keys, through comprehensive effort (</span><span>brute force).</span>
4 0
3 years ago
Other questions:
  • Which is NOT a way the network operating sys-
    6·1 answer
  • Which presenter would most likely benefit from a custom slide show?
    15·1 answer
  • A check of dorms revealed that 38% had refrigerators, 52% had TV’s and 21% had both a TV and a refrigerator. What’s the probabil
    14·1 answer
  • Which of the following makes a virtual tour different from a printed map
    6·2 answers
  • The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemical
    6·2 answers
  • Access control lists (ACLs) are used to permit and deny traffic in an IP router.
    14·1 answer
  • True / False<br> General purpose registers can be read and written by ML programs
    10·1 answer
  • A student is conducting an experiment in which he adds an inhibitor to an enzyme-catalyzed reaction that contains alkaline phosp
    14·1 answer
  • A data table is a range that displays what?
    15·2 answers
  • Draw a circuit with a 12-volt battery and two resistors(100 ohms and 200 ohms) in parallel. What is the total resistance of the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!