1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
4 years ago
7

____ programs are software programs that are distributed on the honor system.

Computers and Technology
2 answers:
Sophie [7]4 years ago
8 0

Answer: shareware programs

Explanation:

Shareware is a type of proprietary software which is initially provided free of charge to users, who are allowed and encouraged to make and share copies of the program. Shareware is often offered as a download from a website or on a compact disc included with a magazine. Shareware differs from open-source software, in which the source code is available for anyone to inspect and alter; and freeware, which is software distributed at no cost to the user but without source code being made available.

Nostrana [21]4 years ago
3 0
Shareware program and they are also used free of charge.**
You might be interested in
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
EastWind [94]

Answer:

create another email for a buisness and private/personal. important emails will go to her personal while junk and un needed emails will go to the buisness

Explanation:

8 0
3 years ago
Read 2 more answers
A computer connected to the Internet that asks for data is a(n) ________. Select one: A. server B. client C. aggregator D. surro
madreJ [45]

Answer:

client

Explanation:

The client makes a request for a service, and a server performs that service.

7 0
4 years ago
What version of bluetooth is installed on the yaesu ft-5dr?.
Olin [163]

Answer:

version 4.2

Explanation:

5 0
2 years ago
Which best describes the purpose of LoJack on a computer
iris [78.8K]

Answer:The purpose of the lo jack on a computer  to the lock and delete files on the computer devices.

Explanation:The lo jack on a computer to locate all the lock and delete files.

lo jack can provides the computer on the passwords that contains different levels of the bios access.

lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.

Lo jack computer on the function is used to the published  the exam answers on the websites.

Lo jack insures to the data into hard drives to the correct computer password.

3 0
3 years ago
Other questions:
  • What type of topography should Carlos choose?
    5·1 answer
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • Nascar has inserted an image into his document but needs the image to appear on its own line Which option should he choose?
    12·2 answers
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • A(n) ___________________________________ is a legal contract between a vendor and a user that governs the use of a software pack
    11·1 answer
  • Inputs and outputs that allow a user to interact<br> with a piece of software
    14·2 answers
  • What should be taken into consideration when determining which critical information should be protected?
    11·1 answer
  • Who is the father of computer​
    7·1 answer
  • What are the three computer components that hold a dangerous amounts of electricity? Even when it’s unplugged.
    15·1 answer
  • Fill the labels!! Please quickly I need help quickly
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!