1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
2 years ago
7

What are two advantages and disadvantages of using computer software?

Computers and Technology
2 answers:
Ghella [55]2 years ago
4 0
Advantage: It does EXACTLY what the programmer told it to do.

Disadvantage: It does EXACTLY what the programmer told it to do.

Software is instructions for a computer to follow. A computer will do so virtually always without fail other than the rare hardware or power issues, even in cases where it shouldn’t, and even in cases where any human would instinctively know that the instructions do not apply. I compare programming to writing instructions for a robotic idiot. It must be perfect, it must address every minute detail, and it must handle every case that will ever arise correctly. Humans write software. Perfection is rare for humans.
Airida [17]2 years ago
3 0

Answer:

Advantages:

Multitasking

Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.

Speed –

Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.

Disadvantages:

Virus and hacking attacks –

Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.

Online Cyber Crimes –

Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.

You might be interested in
The FTC found CardSystems Solutions and its predecessors __________ the FTC Act 15, U.S.
umka21 [38]

Take because it is lit

6 0
4 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
Marina86 [1]

Answer:

I am writing a C++ and JAVA program.    

import java.util.Scanner; //for using input output functions

public class LabProgram { // class name

public static void main(String[] args) {//start of main function body

Scanner input = new Scanner(System.in);

// creates input instance of  Scanner type

     String str;  // declares String type variable str for a string value

     int num;  // declares integer type variable num to hold an integer value

     str = input.next(); //scans and reads input string from user

     num = input.nextInt();  //scans and reads input integer from user

//while loop continues to execute until user enters quit 0

while(str!="quit" && num!=0) {  

/* prints the following message, for example if value of num = 2 and value of str = apples then the following print statement prints Eating 2 apples a day keeps the doctor away. */

System.out.println("\nEating " + num +" " + str + " a day keeps the doctor away.");

//takes string and integer as input again and keep taking input until user //enters quit 0

str = input.next();  

num = input.nextInt(); }   } }

Explanation:

The program is well explained in the comments mentioned with each statement of the program. The program simply prompts user to enter a string and an integer. The while loop keeps executing until user enters quit 0. The program keeps taking input string and integer from user and prints the message System.out.println("\nEating " + num +" " + str + " a day keeps the doctor away.");  The loop breaks when the use enters quit 0. The screenshot of the program along with its output is attached.

3 0
3 years ago
Identify different character components for a given typeface: Arial.
Shkiper50 [21]

Answer: Arial belongs to the sans serif family of typefaces. It is the most commonly used typeface, and it is the default typeface set in Microsoft Word. A character is a typographic element represented through an upper- or lowercase letter, number, or special character. Every letter of the alphabet has multiple parts that we describe with a particular set of terms. Typographers call this “letter anatomy.” The basic terms common to all letters are below:

An ascender is the stroke extending upward, going above the x-height (which is the height of the letter excluding the ascender or descender).

A descender is the stroke extending downward from the baseline (which is the imaginary horizontal line that aligns the bodies of the characters).

A bar is the horizontal stroke in the uppercase letters A, E, F, H, I, and T, as well as in the lowercase letters e, f, and t.

A counter is the blank space within the body stroke.

A bowl is a curved stroke that surrounds the counter.

A shoulder is a curved stroke beginning at the stem.

A serif is the tapered feature at the end of a stroke. Arial is a sans serif font, and it does not have tapered corners at the ends of the main strokes.

3 0
3 years ago
Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will co
svlad2 [7]

Answer:

The best answer is "B"

xfs_fsr

Explanation:

The is a typical format of the command to use:

xfs_metadump -o /dev/sdb1 /reviewxfs

6 0
3 years ago
Read 2 more answers
Other questions:
  • Row array gameScores contains all player scores. Construct a row array highScores than contains all player scores greater than m
    15·1 answer
  • What program controls the hardware and software in a computer?
    10·1 answer
  • 1 Point
    14·1 answer
  • You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri
    5·1 answer
  • What will be the output after the following code is executed? def pass_it(x, y): z = y**x return(z) num1 = 3 num2 = 4 answer = p
    7·1 answer
  • What does this mean??
    11·2 answers
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
  • Please help!!
    6·1 answer
  • Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8):
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!