1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
6

Explain with examples what is software​

Computers and Technology
1 answer:
zvonat [6]3 years ago
8 0

Answer:

Software is the data in your computer for example apps

Explanation:

Apps are a form of software

You might be interested in
Brainliest for whoever adds me on snap<br> gianavaughn007
andrey2020 [161]

Answer:

Adding.

Explanation:

6 0
3 years ago
Read 2 more answers
Code Problem 2 in Python 2.
nlexa [21]

I've included my code in a picture. I hope this helps!

3 0
3 years ago
This is A C++ PROGRAM BTW!! Define a class named Money that stores a monetary amount. The class should have two private integer
inessss [21]
Jasminee accoo i'm very disappointed in you, this was a assignment that you were to do. Can you explain yourself?
7 0
4 years ago
The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100
Elodia [21]

Answer: a) and c).

Explanation:

  • Ethernet is a Layer 2 and also Layer 1 Technology (this layer defines the technical details of cabling and connectors), so any upgrade to a newer, faster version (like 100G Ethernet) will be possible changing only the components operating at these layers, without changing anything in the higher layers like IP and TCP, for instance.
  • This is a direct consequence of the OSI layer model foundations, that say basically that each each layer is independent from the others, so the piece of software pertaining to one layer, only interacts with his layer peer in the destination machine.
  • So, any changes to the technology used in one of the layers, don't usually affect the operation of the other layers.
3 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • HELP QUICK!!!
    14·2 answers
  • Most professional coding standards use _____ for class names. (Points : 2) underscores along with all upper case words
    15·1 answer
  • _____ creates a border or space that separates information.
    14·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • Social networking allows businesses to _______. a. Connect with hundreds of consumers at once b. Provide personal feedback to co
    12·2 answers
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage sm
    8·1 answer
  • A(n) _________ produces dynamic reports, supports alerts/rss functionality, and supports user subscriptions.
    9·1 answer
  • Complete each sentence. To add a graphic to a Word document, start by clicking the tab. Next, click . Then, navigate to the grap
    14·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!