The collection of programs on a computer is referred to as _______________.​

Answers

Answer 1
It is referred to as software

Software consists of an entire set of programs and routines linked with the operation of a computer. In other words, it is a collection of executable instructions that enable you to interact with a computer and its hardware. A computer would be rendered useless without software.

 







Related Questions

If a pilot is converting standard time to UTC time and is given the time 1730 UTC, what would EST be?

Answers

The answer is 12:30 hours

Coordinated Universal Time which is abbreviated as (UTC) is a successor to the Greenwich Meridian Time. Offset, UTC is zero hours ahead of GMT and is universally used. It regulates clocks and time. EST (Eastern Standard Time) is minus 5 hours from UTC. Thus, 17:30 in EST will be 12:30 hours






Answer:

4:30PM

Explanation:

I believe this because I think pilots use military time if I'm not to be mistaken...

What are the Advantages and Disadvantages of Data Back Up?

Answers

Hello There!

[tex]Advantages[/tex] -

° Not affected by power surges, lightning, fire, flooding or other natural disasters 

° Storing data with a credible organizations generally reliable; they run multiple back ups to ensure data safety.


[tex]Disadvantages [/tex] -

° You must trust the organization

° Requires a lot of bandwidth and data support

° Concern over security when data is in transit

° Managing remote back ups may not be as simple as local back ups 

Hope this helped!


Which feature of Excel changes obvious misspellings automatically?

A. AutoCorrect
B. Spelling
C. AutoComplete
D. Quick Analysis

Answers

I believe the answer is AutoCorrect.

What type of port scan is similar to a syn scan and is risky to use because it relies on the attacked computer's os?

Answers

port scanning is used by security testers and hackers to check the security and vulnerabilities of a network.
The connect scan is similar to a syn scan and is risky to use because it relies on the attacked computer's OS. The connect scan includes Nmap asking its underlying Operating network to establish a connection with the target server by issuing the “connect” system call.

Entering the search criteria "B?" would yield which of the following results?

A. Bentonville
B. Bedford
C. Be
D. Birmingham

Answers

the answer is (D) hope this helps !

Which of the following is not an Operating System? (1 point)Windows
Mac XP
Linux
Mac OS

2. Windows XP ________and Windows XP Home Edition have the same interface design. (1 point)2000
Professional
98
OS

3. Which of the following operating systems is considered to be open source? (1 point)Mac OS
Windows XP
Windows 98
Linux

4. Which operating system is considered to be the most popular with graphic and multimedia designers? (1 point)Linux
Mac OS
Unix
Windows 98

5. The software _______is the number and variety of programs available for a particular operating sy

Answers

The answers of the following are:

1.  The answer is Linux. It is not an Operating System.
2. Windows XP 2000 and Windows XP Home Edition have the same interface design. 
3. Linux is the operating systems which is considered to be open source.
4. Mac OS is an operating system which is considered to be the most popular with graphic and multimedia designers
5. The software programis the number and variety of programs available for a particular operating system.

In what type of attack does the attacker send unauthorized commands directly to a database?

Answers

SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.

A router operating at layer 3 primarily makes its forwarding decision based on what address

Answers

The third layer of the OSI model is the networking layer, which routes packets based on the IP Address.

Complete the following sentence with the best phrase below.
Removing just one species from an ecosystem
A.would have no effect, because it is just one species of many.
B.would have little effect, unless it was a keystone species.
C.would have a negative effect, unless it was an endangered species.
D.would have a negative effect, especially if it was a keystone species.

Answers

I think it's C or B. Not really sure.


1.

Static electricity refers to the transfer of _____________.


atoms

charge

molecules


2.

Charge can be transferred several ways. In the clothes dryer example given or in the experiment using the paper and plastic spoon, charge is transferred by _____________.


conduction

friction

induction

3.

The transfer of charge by direct touch is called ___________.


conduction

friction

induction


4.

Opposites attract: magnets or charges. This is the ___ ___ ___.


law of opposites

law of attraction

law of gravity



Answers

Answer: Friction

Explanation:

Static electricity refers to the transfer of charges. Therefore, the correct option is B.

What is static electricity?

Static electricity is the electricity that is produced due to the polarity between the positive and the negative charges of the body.

1. Static electricity refers to the transfer of charges.

2. Charge can be transferred several ways. In the clothes dryer example given or in the experiment using the paper and plastic spoon, charge is transferred by friction.

3. The transfer of charge by direct touch is called conduction.

4. Opposites attract: magnets or charges. This is the Law of Attraction.

Therefore, static electricity occurs due to transfer of charges. Therefore, the correct option is B.

Learn more about static electricity, here:

https://brainly.com/question/26609519

#SPJ6

The question is incomplete, but most probably the complete question is,

1. Static electricity refers to the transfer of _____________.

a. atoms

b.charge

c. molecules

2. Charge can be transferred several ways. In the clothes dryer example given or in the experiment using the paper and plastic spoon, charge is transferred by _____________.

a. conduction

b. friction

c. induction

3. The transfer of charge by direct touch is called ___________.

a. conduction

b. friction

c. induction

4. Opposites attract: magnets or charges. This is the ___ ___ ___.

a. law of opposites

b. law of attraction

c. law of gravity

Technological progress has reduced the cost of manufacturing mp3 players. what happens if demand is unchanged?

Answers

 more mp3 players will sell at a lower price 

A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.

Answers

The answer is a mobile device

In general term, a mobile device is any handheld computer or smartphone. One of the few characteristics of mobile devices is that it has a cellular or Wi-Fi access to the internet and a battery that powers and charges the device for hours. Its portable nature allows it to be carried and manipulated with different hands.






______ devices are high-performance storage servers that are individually connected to a network to provide storage for the computers connected to that network.

Answers

NAS - network attached storage

The ___________ command inserts a hex e5 (0xe5) in a filename's first letter position in the associated directory entry.​

Answers

The answer is the delete command


When a file is deleted with the MS-DOS delete command, the hex e5 (0xe5) value tells the OS that the file is unavailable and a new file is ready to be written to the same cluster position. In a FAT file system, when you delete a file, the hex e5 character replaces the 1st letter of the filename and the file of that FAT chain is set to 0

 

 


Which new technology protects a cpu from heat damage by slowing the clock rate on the cpu?

Answers

Answer - CPU Throttle Technology



Explanation:


The CPU Throttle Technology protects a CPU from heat damage by slowing the clock rate on the CPU. CPU Throttling is a feature that protects a CPU from heat damage, When a CPU is not cooled properly and the temperature of the CPU becomes high, the CPU throttle technology slows the clock rate on the CPU to prevent further overheating and damage. When the clock rate of a CPU is reduced it, requires very little power to operate, and thus the heat generation is also reduced. The CPU throttling technology also causes the system to operate at a lower speed. For example; if the actual speed of the CPU is 1 GHZ, after throttling down the clock rate, the CPU might slow only 500 mega hertz.



Hope this helps.

Which is a good guideline to follow when looking for research material on the Internet?
a) Pay attention to URL endings, such as .gov and .com
b) Use only search engines to find information
c) Use only professional-looking websites.

Answers

Hello,

The answer is option A pay attention to URL endings, such as .gov and .com.

Reason:

Its A because its a very important guideline to make sure you look for the root words .gov and .com to make sure its professional. Its not option B because using search engines can cause viruses. Its also not option C because anything can look professional just by how the website looks and says.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
You should pay attention to the URL endings on sites, it is vital so youy might find more trustful info like if you wanted o know about rockets, you would search for a .net or .gov url endings

Using applications on smartphones and tablets to buy and sell products is known as ________ commerce. remote web smart mobile

Answers

Answer:

Mobile Commerce

Explanation:

A subset of e-commerce, mobile commerce has consistently become a trend and has continued to be on the rise. Any commercial transaction made through smartphones and handheld devices is what is commonly known as m-commerce or mobile commerce. With just a few clicks, you can conveniently access goods and services online much quicker and effecienly.

Which is an example of the advertising technique called audience interaction
A. Reading the text in an online advertisement
B. Sending a text to download a song from a show
C. Receiving a text message inviting you to a party
D. Writing a message on the message board of a blog

Answers

The answer to your question is OPTION B

Answer:

B. Sending a text to download a song from a show.

Explanation:

The advertising technique of audience interaction can be extremely effective when it comes to drawing a person or an audience into the advertisement. This technique requires the audience to interact with the advertisers. In this example, the receiver is encouraged to interact with the advertisement by asking him to send a text that allows him to download a song from a show.

What do you have to do to see the HTML code on a website?

A) Click the Normal tab.

B) Click the HTML Tags tab.

C) Click the Source tab.

D) Click the Preview tab.

Answers

b I think it is but I am not 100% sure on

The option c is correct. To see the HTML code on a website, you need to click the Source tab or use the 'View Page Source' option in your web browser's context menu.

To view the HTML code on a website, you need to click on the Source tab. This will display the underlying code used to build the webpage you are viewing.

Here's a step-by-step process:

Open your web browser and load the website you want to inspect.Right-click on the page and select 'View Page Source' from the context menu. This option may vary slightly depending on the browser.A new tab or window will open displaying the HTML code of the webpage.

This feature is commonly used by web developers and those seeking to learn how websites are constructed.

Computer programs that can scan computer disks for virus-like coding are called:

Answers

Computer programs that can scan computer disks for virus-like coding are called: antivirus software

how did ancient egyptian and greek ideas about the human capacity for thought differ

Answers

In the very early ancient times, mankind did not attribute human psychological processes like thinking to be the work of the brain. They thought whatever was inside someone’s body did not differ from what was inside an animal’s body.

The ancient Egyptians, for instance, believed that there was a little person who dwelt within the skull and regulated human behavior. On the other hand, the Greek thought the soul resided in the heart. Basing on these facts, the differences between the Greeks and Egyptians is found greatly in their religion.

Greeks believed in a dialogue with the gods while the Egyptians believed the gods had complete power and their will could not change. Therefore, the Greeks used logic while the Egyptians saw everything based on religion and magic.






Final answer:

Ancient Egyptian thought greatly influenced Greek philosophy, with notable Greek scholars studying in Egypt, though Greeks developed a more rational and humanist approach to understanding the universe and human capacity. The Greeks focused on human perception and nature while Egyptians contributed foundational knowledge in mathematics and astrology.

Explanation:

The ideas about human capacity for thought in ancient Egyptian and Greek civilizations were shaped by their cultural context and understanding of the world. Ancient Egyptians, known for their advancements in mathematics and astrology, deeply influenced Greek thought. This cultural exchange is evident from the extensive studies of Greek scholars like Pythagoras and Plato in Egypt. Moreover, Greek philosophy focused on human perception and the nature of the universe, contributing significantly to rational thought, as opposed to simply accepting beliefs on faith.

Hellenic thought was propelled by an intellectual approach that questioned the universe's nature and ethical foundations. Unlike the Egyptians, who are credited with many firsts in areas like geometry, the Greeks were known for a more humanist perspective, valuing individual achievements and capabilities, which continued to resonate through the Renaissance and into modern Western civilization.

However, there was a symbiotic relationship between the two cultures, with Greeks adopting and transforming Egyptian practices and ideas, such as the belief in an immortal soul and ceremonial religious practices, into their own philosophical frameworks, as Herodotus and other historians of the time have indicated.

What should you do when an error message pops up on the screen?

A.)Select okay and continue working.
B.) Write down the error message and continue working.
C.)Turn your computer off and let it cool before turning it back on.
D.) Write down the error message and research the cause based on the message.

Answers

D.) Write down the error message and research the cause based on the message.

The correct statement is (D) Write down the error message and research the cause based on the message option (D) is correct.

What is the error?

The difference between the measured and analysis of the financial statements might well be defined as an error. For instance, if the two operators use the same complete and precise tool.

It is given that:

The statement:

What should you do when an error message pops up on the screen?

As we know,

Technical errors are those that are not serious enough to be considered defects that cannot be fixed. For instance, failing to sign your application is a simple mistake that can be fixed, and adding your signature won't create any new problems that could lead to your application being refused.

Thus, the correct statement is (D) Write down the error message and research the cause based on the message option (D) is correct.

Learn more about the error here:

https://brainly.com/question/22248350

#SPJ2

which of the following careers is part of the Printing Technology pathway?
Composer
Proofreader
Textile designer
Lithographer

Answers

textile designer i think

Answer:

Textile?

Explanation:

How do keystroke dynamics determine whether to authenticate an individual or not?

Answers

Keystroke dynamics determine whether to authenticate an individual or not with dwell and flight time.  Dwell time (the time a key pressed) and Flight time (the time between "key up" and the next "key down") . These keystroke dynamics prevent online fraud.

Recording music using a keyboard controller is commonly accomplished using which type of audio file format?

Answers

Musical Instrument Digital Interface (MIDI)

Which of the following is an example of a tax?

A. Medicare
B. Rental payment
C. Line of credit
D. Cash payment

Answers

the anwser is A my human friend

Medicare is an example of tax.

Medicare tax

A federal employment taxation which thus helps to pay a component of such Medicare health care policy. Medicare tax, including Social Security contributions, has been taken from such an employee's salary as well as payable as an identity tax.

Medicare revenues pay for hospitalization, rehabilitation, as well as nursing facility assisted living but also disabled.

Thus the response above i.e., "Option A" is correct.

Find out more information about Medicare tax here:

https://brainly.com/question/1899088

Assume you have a table listing the color T-shirts available in inventory. If you're using AND in a query to identify how many green and blue shirts are available, what type of result would you expect to receive? A. A list of all green shirts only B. A list of all shirts not green or blue C. A list of all blue shirts only D. A list of all green and blue shirts

Answers

i believe the answer is d

Answer:

D. A list of all green and blue shirts

Explanation:

Without the actual query used, it is uncertain how the AND keyword was used, and therefore the results obtained. In the strict sense of the AND meaning you may expect to obtain both green & blue tshirts. For that reason D option fits more appropriate than other choices.

However if not used carefully, a simple WHERE clause like this:

WHERE tshirt.color = "green" AND tshirt.color = "blue"

will return zero results, since the same tshirt.color field cannot be "green" & "blue" at the same time.

1. The _______ button automatically displays next to the data when you select a range of numeric data, which is an available option for creating a chart.
A. Recommended Charts
B. Chart Elements
C. Chart Styles
D. Quick Analysis

Answers

Quick Analysis tool - A tool that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools, such as, charts, color-coding, and formulas.



Recommended Charts- An excel feature that displays a set of charts according to Excel's calculations, will best fit your data based on the range of the data that you select.


Chart Style - The overall look of a chart in terms of it's graphic effects colors, and backgrounds; for example, you can have flat or beveled columns, colors that are solid or transparent, and back grounds that are dark or light.


Chart Elements Button - A button that enables you to add, remove, or change chart elements, such as, the title, legend, gridlines, and data labels.



Chart - Is the graphic representation of data in a worksheet; data presented as a chart is usually easier to understand than a table of numbers.





Hope this helps.

Pick your best choice, now that it's broken down for you!


Jasper has an annual salary of $71,000, and his company pays him twice a month. What is the gross income per paycheck that Jasper receives? A. $1365.38 B. $5916.67 C. $11,833.33 D. $2958.33

Answers

First, you divide $71,000 by 12, to get the salary per month.

$71,000 / 12 = $5,916.66.

Next, you divide the amount in a month by 2, to see how much money is paid for each half of a paycheck.

$5,916.66 / 2 = $2,958.33

Since the payment for every paycheck is $2,958.33, the answer is D.
An annual salary of $71,000 means the following:
A monthly salary of $71,000 / 12 = $5916.66

Since his company pays him twice a month, we have to divide this amount of money by 2.
$5916.66 / 2 = $2958.33

Hence, per paycheck Jasper receives D. $2958.33

Which command will display a list of the currently defined aliases on the system?

Answers

The alias command.

This command list all aliases currently assigned or defined on the system without using arguments. However, in bash environments, arguments can be used. In many occasions, aliases are loaded at initialization of your shell. This command is built in a number of shells like ash, bash, ksh and csh




Other Questions
Ms bean used 6 box of tea bags in 4 weeks there are 20 tea bags in each box how many tea bags did she use in 1 week which of the following is a common subject of Teodor Nunez ureta's paintings?A. andean peasantsB cuzco city lifeC traditional perivian foodD the spanish conquest of the incas@jazzyspazzy Charlie buys 3 computer tables for $390.How much did he pay for each table? Which sentence is punctuated correctly?The writer said, I expect to be finished with this novel in a month.The writer said I expect to be finished with this novel in a month.The writer said, I expect to be finished with this novel in a month.The writer said I expect to be finished with this novel in a month. triangle abc has vertices a(1 4) b(-2,4) c(-1,-1) . A dilation with a scale factor of 0.25 and center at the origin is applied to the triangle. what are the coordinates of B in the dilated image? What is the major theme in this excerpt from "Ulysses" by Alfred, Lord Tennyson?A)the yearning for new experienceB)the desire for a peaceful lifeC)the desire for material gainD)the longing for popularity how do you do 6.390.09 In Ezra Pound's poem "In a Station of the Metro," the image of flower petals on a wet bough is an example ofA.nihilism.B.imagism.C.materialism.D.romanticism. HELP PLEASE!!Susan keeps track of the number of tickets sold for each play presented at the community theater. within how many standard deviations of the mean do all the values fall?135, 71, 69, 80, 158, 152, 161, 96, 122, 118, 87, 85. scientists have never seen the ancient horses shown in figure 16-4 what do you think was the main type of evidence scientists used to prepare these diagrams Lisa bought a share of stock for $48.24. She was paid a dividend of $12.06. What percent of the stock price is the dividend? Which of the following BEST describes the language of the Houyhnhnms in Gulliver's Travels? Language has no vowels. Pictures represent words and ideas. Language is spoken and not written. Language is limited to only 10 letters. Which skill set will you rely on when you plan a health-related advocacy project? goal-setting skills active-listening skills decision-making skills conflict-resolution skills Our ability to achieve long-term goals depends not only on our achievement motivation, , and ability to delay gratification, but also on our , which is a deep passion for our goals and a willingness to work toward them even when faced with hardships and pitfalls. people who lack this trait tend to give up or get sidetracked by new interests. To quickly identify a mineral sample, geologists use: Find the common difference of the arithmetic sequence Which kinds of cancers are common among people with AIDS?cervical cancer and liver cancermouth cancer and Kaposis sarcomabreast cancer and liver cancercervical cancer and Kaposis sarcoma What type of research is campbell's using to determine which soup consumers will like the best? A rectangle room is 2 times as long as it is wide, and its perimeter is 28 meters. Find the dimension of the room.The length is _____ meters and The Width is ______ meters . What is Eriksons psychosocial task of late adulthood? What problem results if this task is not accomplished?