?Case 3-2
Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software.
Michelle wants an application program that can use formulas to perform calculations and organize numbers and values into rows and columns. Identify the application program that Michelle should choose.

A. ?Word processing program
B. ?Spreadsheet program
C. ?Presentation software
D. ?Note taking software


Answer: B

Computer Science & Information Technology

You might also like to view...

Portions of the kernel’s address space must be allocated for the new code and data. Symbols within the new code and data must be resolved to items in the kernel’s address space. For example, it would use the kernel’s message-handling functions. By contrast, if the server was to execute as a separate process then it would run from a standard address in its own address space and, apart from references to shared libraries, its linked image would be self-contained.

What will be an ideal response?

Computer Science & Information Technology

VPNs use which of the following protocols to provide encrypted secure connection?

A. SSL and TCP B. IPsec and TCP C. IPsec and SSL D. SMTP and TCP

Computer Science & Information Technology

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

a. STP must first select the root bridge, or master bridge. b. STP examines the possible paths between all other bridges. c. STP disables links that are not part of a shortest path. d. STP begins to block BPDUs on non-designated ports.

Computer Science & Information Technology

New attacks using vulnerabilities that haven't yet been identified (and fixed) are called ____________________ attacks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology