1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
5

Software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common serv

ices for executions of various application software
Computers and Technology
1 answer:
Anit [1.1K]3 years ago
5 0
Probably an Operating System like Mac, Linux, or Windows. There may be a type of downloadable software to do this, but may be debatably safe.
You might be interested in
When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
Black_prince [1.1K]
I think that the  insurance coverage amount should be based on the appraisal value of the house. Appraisal value is an evaluation of the value of property based on a given point in time. This evaluation is done by an appraiser who is chosen by the lender.
3 0
2 years ago
Read 2 more answers
Part of preforming routine computer maintenance includes
omeli [17]
Cleaning And tidy cords
7 0
3 years ago
Read 2 more answers
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Vadim26 [7]

Answer: true

Explanation: true

6 0
2 years ago
Is a Mazda RX7 rotary?​
bagirrra123 [75]

Answer:

Mazda RX-7. The Mazda RX-7 is a front-engine, rear-wheel-drive rotary engine powered sports car manufactured and marketed by Mazda from 1978–2002 across three generations—all noted for using a compact, lightweight Wankel rotary engine.

4 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Other questions:
  • This was not a "true" operating system, but rather an operating environment.
    5·1 answer
  • When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. you collect a capture fro
    12·1 answer
  • Study and compare the tables and draw conclusions.
    13·1 answer
  • When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer wi
    7·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • Write the difference between left-sentential form and <br> right-sentential form
    13·1 answer
  • How can i fix a all white phone screen
    11·2 answers
  • Delete temp or %temp% files in Windows 10 is safe and, can it help boost up your PC fps?
    5·1 answer
  • 30 Points!!
    13·2 answers
  • Amogus :0) owo have a good day y'all
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!