1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
3 years ago
5

What is the difference between software hardware ???

Computers and Technology
2 answers:
postnew [5]3 years ago
8 0

Answer:

Some differences are written below:

Explanation:

Hardware refers to the physical components of the computer. You can see and touch it (keyboard, screen, mouse, monitor..etc..)

Computer Software is a programming code executed on a computer processor.We can see and also use the software but can’t touch them. (Ms Word, Excel, Power Point, Photoshop..etc..)

Hardware can't perform tasks without software. And Software can't be executed without software.

Hardware has four main categories: input device, output devices, storage, and internal components.

Software is divided into System software, Programming software and Application software.

Hardware is not affected by computer viruses. Software is affected by computer viruses.

defon3 years ago
3 0
Software are parts of a computer system that can be seen but not touched.

Hardware are parts of a computer system that can be seen and touched
You might be interested in
Ferestre de navigare
Stells [14]
LOLOLOLOLOLLOLOLOLOLOLOOOLOLOLOOLOLLOLOLOLOLOLO

7 0
3 years ago
Each TextField has a text property that's returned by its textProperty method as a StringProperty. The StringProperty method ___
masha68 [24]

Answer:

B: Bind

Explanation:

JavaFX property binding permits the synchronization of the value of two properties in such a way that whenever there is a change in one of the properties, there is an immediate update on the value of the other property. In this way, The StringProperty method bind receives an ObservableValue as an argument. When the ObservableValue changes, the bound property is updated accordingly.

4 0
3 years ago
Create the setStyles() function using the commands listed in the steps below. Christine wants one of five fancy style sheets to
jolli1 [7]

Answer:

Hi there! This can be implemented in a simple Python function which uses the "random" module to generate the number.

Explanation:

Using Python as the languge, we can write a the below code in a file called styles.py. The first line imports the randint function from the "random" module. The setStyles() function declares an array or 5 elements (here I have just used numbers but these could be string names of the stylesheets as well). Next, styleNum is assigned the random number and the associated stylesheet is selected from the array of stylesheets.

styles.py

from random import randint

def setStyles():

   stylesheets = [1,2,3,4,5];

   styleNum = randint(1,5);

   stylesheet = stylesheets[styleNum];

   print(stylesheet);

setStyles();

3 0
3 years ago
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
Can someone please answer this for me ? What is data centre virtualization?
castortr0y [4]
Data center virtualization is the process of designing, developing and deploying a data center on virtualization and cloud computing technologies. It primarily enables virtualizing physical servers in a data center facility along with storage, networking and other infrastructure devices and equipment.
3 0
3 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
    13·1 answer
  • The user documents are stored in _______ format.
    15·1 answer
  • Professional photography is a competitive job field. <br> true <br> false
    12·2 answers
  • I need help!!!!
    13·2 answers
  • What was the first Apple computer, and who was it designed by?
    7·2 answers
  • How to get the absolute value in coding begginners?
    13·2 answers
  • Please Help!!!<br> I keep getting this answer wrong
    10·1 answer
  • Select the two true statements about functions with parameters:
    15·1 answer
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!