Software

A:

Application software are computer programs that allow users to perform specific tasks. These programs are commonly referred to as "apps," and are usually completely self-contained and commercially produced.

See Full Answer
Filed Under:
  • How does one get rid of hackers?

    Q: How does one get rid of hackers?

    A: Hackers can be avoided by taking necessary measures like having up-to-date antivirus software, strong passwords and a good firewall. There are other ways to avoid hackers as well, like avoiding phishing scams.
    See Full Answer
    Filed Under:
  • How do you install Aimbot in a PS3?

    Q: How do you install Aimbot in a PS3?

    A: The process of installing an Aimbot on to a PS3 is a fairly simple procedure. If you have the Aimbot software on your computer, all you need to do is transfer and install the file to your PS3 using a memory stick. Download the software to your computer if you do not have it yet. You will need access to a desktop or laptop, an Internet connection and a memory stick.
    See Full Answer
    Filed Under:
  • What is an identity theft shield?

    Q: What is an identity theft shield?

    A: Identity Theft Shield is a third party consumer credit-monitoring service. The service provides three continuous services to help consumers combat against identity theft. Credit card merchants, credit unions and banks all offer this service.
    See Full Answer
    Filed Under:
  • How can I tell if my computer is being monitored?

    Q: How can I tell if my computer is being monitored?

    A: Software designed to monitor computer activity can be found under Processes in the Task Manager on a PC. Simply press Ctrl-Alt-Del to bring up the Task Manager. On a Mac, open up Gadgets and Gizmos, and then click Utilities and Activity Monitor to pull up the running processes.
    See Full Answer
    Filed Under:
  • What is the FBI locked computer virus?

    Q: What is the FBI locked computer virus?

    A: The FBI locked computer virus, more commonly known as the FBI Virus or FBI Moneypak Virus, is a dangerous class of malware titled "ransomware," which impedes a user from accessing different parts of his computer. It locks his computer screen and displays a message, seemingly sanctioned by the FBI, that demands payment of a fine set at varying amounts. It is capable of infecting Windows and Apple computers alike.
    See Full Answer
    Filed Under:
  • What is the equivalent of Notepad on a Mac?

    Q: What is the equivalent of Notepad on a Mac?

    A: The equivalent to Notepad on a Macintosh computer is the program TextEdit. It is a word processor that is bundled with the OS X operating system.
    See Full Answer
    Filed Under:
  • What is the way to remove a trojan horse virus from your computer?

    Q: What is the way to remove a trojan horse virus from your computer?

    A: One of the simple ways to remove a Trojan horse virus from a computer is to restart the computer in Windows "Safe Mode" and then run an anti-malware application. Trojans are computer programs that are created to perform harmful and malicious actions, which include deleting, modifying and blocking data in a computer, stealing information from an infected computer or becoming part of a Trojan bot network designed to attack specific websites and take them down.
    See Full Answer
    Filed Under:
  • What is a software suite?

    Q: What is a software suite?

    A: A software suite is a collection of several applications that are bundled together and sold or distributed as a package. Each component program generally provides different, but related, functionality.
    See Full Answer
    Filed Under:
  • What are the functions of application software?

    Q: What are the functions of application software?

    A: The function of application software is to perform specific operations for various applications. These functions include writing reports, creating spreadsheets, manipulating images, keeping records, developing websites and calculating expenses. Examples of application software include Microsoft Excel, Microsoft Word and desktop publishing applications.
    See Full Answer
    Filed Under:
  • What is the difference between "paste" and "paste special"?

    Q: What is the difference between "paste" and "paste special"?

    A: Paste is a feature that lets users cut or copy items from a document and transfer them to another. Paste Special allows the items being transferred to be formatted in several different ways. Paste Special is a feature found in Microsoft Word, Microsoft Excel and OpenOffice.
    See Full Answer
    Filed Under:
  • How do you make a division symbol in Word?

    Q: How do you make a division symbol in Word?

    A: The division sign is considered a symbol in Microsoft Word. To insert a division sign, you must access the symbol menu. The process takes less than a minute.
    See Full Answer
    Filed Under:
  • How do fingerprint scanners work?

    Q: How do fingerprint scanners work?

    A: Fingerprint scanners capture digital images of fingerprints and compare them to other fingerprint images on file. There are two main types of fingerprint scanners: optical scanners and capacitive scanners.
    See Full Answer
    Filed Under:
  • What is an .EMF file extension?

    Q: What is an .EMF file extension?

    A: EMF stands for "enhanced metafile," or an enhanced windows metafile. A file with the .EMF file extension is used by the Windows operating system when printing a file.
    See Full Answer
    Filed Under:
  • What is application software?

    Q: What is application software?

    A: Application software are computer programs that allow users to perform specific tasks. These programs are commonly referred to as "apps," and are usually completely self-contained and commercially produced.
    See Full Answer
    Filed Under:
  • What is the purpose of a firewall?

    Q: What is the purpose of a firewall?

    A: Firewall software is commonly installed on computers in order to monitor incoming and outgoing packet requests and to block any that may be from an untrustworthy source. Firewalls and antivirus programs are the two most basic forms of computer protection.
    See Full Answer
    Filed Under:
  • When was the first computer virus created?

    Q: When was the first computer virus created?

    A: The first computer virus was created on an Apple II computer in 1981, by a 9th grader. Richard Skrenta was that smart and mischievous 9th grader who knew a lot about computers. He first wrote code on his friends’ pirated computer games (on floppy disks, well before the unified internet) to prank them. He would alter copies of the games to self destruct after a certain number of plays.
    See Full Answer
    Filed Under:
  • How do you partition a hard drive in Windows 7?

    Q: How do you partition a hard drive in Windows 7?

    A: To partition a hard drive in Microsoft Windows 7, open the Disk Management tool. Select an unallocated area of the hard drive to create a new partition. Complete the partition process by specifying the volume size, volume letter and other options related to the file system.
    See Full Answer
    Filed Under:
  • When using a database, what is a field?

    Q: When using a database, what is a field?

    A: In a database, the field is the smallest source of input for users to enter data. For example, a field in a database may ask for a company's name, tax identification number or income. A group of many fields is called a record, and a field in a spreadsheet is known as a cell.
    See Full Answer
    Filed Under:
  • What are the advantages of Microsoft Word?

    Q: What are the advantages of Microsoft Word?

    A: There are many different advantages to using Microsoft Word as your word processor such as ease of use, and popularity. Additional advantages include customer support, number of features and familiarity.
    See Full Answer
    Filed Under:
  • What is a computer-based information system?

    Q: What is a computer-based information system?

    A: A computer-based information system, or CBIS, uses computers to collect, process, store, analyze and distribute information for a specific purpose, such as meeting a business objective. The main components of a CBIS include hardware, software, data, procedures and people.
    See Full Answer
    Filed Under:
  • What are the two types of computer software?

    Q: What are the two types of computer software?

    A: The two main types of computer software are the system software and the application software. The system software provides the platform for users to install and run application software, and it's made up of multiple programs needed to run a computer system smoothly. Application programs are designed to perform specific tasks, such as word processing, video editing, spreadsheets and web browsers.
    See Full Answer
    Filed Under: