1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
10

Software that interprets commands from the keyboard and mouse is also known as the what?

Computers and Technology
1 answer:
sukhopar [10]3 years ago
7 0
<span>The software that interprets commands from the keyboard and mouse is also known as the device driver. The device driver is a program that is usually built into the operating system already. It's very important to have the correct device driver in place, otherwise your hardware devices will not be able to communicate with the computer effectively.</span>
You might be interested in
Yo, what's the tinyclick.ml/7hTq link?? I don't trust it, but I'm curious-
Rashid [163]
<h2>Answer:</h2>

<u><em>Usually, random people will say that on your questions page to give you a virus but then that link doesn't look like the same link I see every day. I would still not click it just in case.</em></u>

<h2>Explanation:</h2>

<em>Have a good one!</em>

<h2>( ◑‿◑)ɔ┏--┑٩(^◡^ )</h2>
5 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
How do transformers work?
Umnica [9.8K]
A transformer will either step up or down to the necassary voltage using a core wrapped in a coil of wires.
8 0
3 years ago
Read 2 more answers
create a list of numbers 0 through 40 and assign this list to the variable numbers. then, accumulate the total of the list’s val
gogolik [260]

Using the knowledge in computational language in python it is possible to write a code that create a list of numbers 0 through 40 and assign this list to the variable numbers.

<h3>Writting the code:</h3>

<em>numbers=list(range(53));</em>

<em>print(numbers);</em>

<em>str1 = "I like nonsense, it wakes up the brain cells. Fantasy is a necessary ingredient in living."</em>

<em>numbs=sum(map(lambda x:1, str1))</em>

<em>print(numbs);</em>

<em>numbers=list(range(41));</em>

<em>sum1=sum(numbers);</em>

<em>print(sum1);</em>

See more about python at brainly.com/question/18502436

#SPJ1

5 0
2 years ago
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Who gave a demonstration of modern computer systems showing a mouse and when?
    8·1 answer
  • A bowl contains 20 candies; 15 are chocolate and 5 are vanilla. You select 5 at random. What is the probability that all 5 are c
    6·2 answers
  • Which line(s) immediately flush the output buffer?
    8·1 answer
  • You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi
    11·1 answer
  • Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
    6·1 answer
  • When creating a documentary, what is not an appropriate source for footage?
    11·1 answer
  • A small monster collector has captured ten Bagel-type small monsters. Each Bagel-type small monster has a 35% chance of being a
    8·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • What ethical concerns might arise from applying new IT to law enforcement?
    5·1 answer
  • A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!