answersLogoWhite

0

Subjects>Electronics>Computers

Is nashot a software

User Avatar

Anonymous

∙ 13y ago
Updated: 12/17/2022

System sotware

User Avatar

Anonymous

∙ 5y ago
Copy

What else can I help you with?

Related Questions

Which is India's first antivirus?

It is Nashot ,which was introduced way back in 1989


Is spreadsheet a hardware or software?

A spreadsheet is software.


Is VDU a hardware or a software?

software


What are the three kins of of software?

System software,Programming software,Application software


Is compiler a system software or application software?

It is a system software.


Word processing software spreadsheet software database software and presentation software are examples of what category of computer software?

They are classified as being applications software.


Two kinds of software?

two kinds of software are system software and application software


Is software categorized as user software and aystem software?

Yes,you can categorized software like this.


Is software development is software engineers work?

Yes, software engineers develop software.


Is a computer VDU hardware or software?

software


What software does antivirus software belongs to?

Application software


What kind of software occurs when someone steals software media intentionally erases software programs or illegally copies a software program?

Software Theft

Trending Questions
Where can you download ntoskrnl.exe for Windows XP Home Edition? How many bits are there in a megabyte? Is the ability to process information and multi task continues to diminish with every drink? A file name extension is an optional file identifier that is separated from the main file name by a? What is a gadget in the contexts of a Windows operating system? What AR covers storage of PII on a government network? Is it hard for men and women to talk to each other? How many liters of soil in a tone? How do I enable a http port? What laptop is better toshiba or lenovo? Full meaning of www? What is the name of the HIPS policy that enables you to list applications that are known to be safe have no known vulnerabilities and are allowed to perform any operation? What will the volume be of a bottle that holds 1 liter of liquid in centiliters? What are some fun things to do In Windows XP? Why is ssh protocol used to access security devices? Why didn't you accomplish the task? Does the Acer aspire 4736z keyboard light? How many liters are there in 7 pints? Who is a famous Attronica Computer Company person? What does a slash look like?

Resources

Leaderboard All Tags Unanswered

Top Categories

Algebra Chemistry Biology World History English Language Arts Psychology Computer Science Economics

Product

Community Guidelines Honor Code Flashcard Maker Study Guides Math Solver FAQ

Company

About Us Contact Us Terms of Service Privacy Policy Disclaimer Cookie Policy IP Issues
Answers Logo
Copyright ©2025 Infospace Holdings LLC, A System1 Company. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Answers.