1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
3 years ago
6

Gine one example of Software In each Category

Computers and Technology
1 answer:
Monica [59]3 years ago
7 0

Answer:

Freeware, System Software, Shareware, Open-source, Firmware.

You might be interested in
Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
Dafna1 [17]

Would it be "phishing?" Like, clicking a fake URL and getting hacked.

6 0
4 years ago
A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned,
BaLLatris [955]

Answer:

The answer is read only permission

Explanation:

The effective permission for the user is the read only permission.

8 0
3 years ago
<img src="https://tex.z-dn.net/?f=1%20%5Ctimes%202" id="TexFormula1" title="1 \times 2" alt="1 \times 2" align="absmiddle" class
Ber [7]
The answer is 2, but this is something you should know
8 0
3 years ago
Read 2 more answers
The signal for a turn should be made at least ______ feet before yo wish to make the turn
LenKa [72]

100 feet away before turning.

7 0
4 years ago
A decrease in Government Expenditures results in _________.
katrin [286]
Your answer is a to your question
8 0
4 years ago
Other questions:
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • A(n _______________ is a pre-written formula that is built into excel
    12·1 answer
  • Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
    9·1 answer
  • Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 4T(n/2 + 2) + n. Use the substitution m
    5·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • Alcohol _____________.
    10·1 answer
  • Who would win in a fight iron man or bat man​
    5·2 answers
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
    8·1 answer
  • 2. Why do old video games have large pixels and images with jagged edges?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!