1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per

sonally made CD with the key written on it. You suspect the software is pirated. What do you do?"
Computers and Technology
1 answer:
pickupchik [31]3 years ago
7 0

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

You might be interested in
A keyboard shortcut to pasting in a document is to key _____.
m_a_m_a [10]
(Ctrl + V) is the shortcut for pasting.

Similarly, (Ctrl + C) is the shortcut for copying.
6 0
3 years ago
01110111 01101000 01100001 01110100 00100000 01101001 01110011 00100000 00110001 00101011 00110001
Lera25 [3.4K]
Same lol thesis so me right now
7 0
4 years ago
The __________ unit is capable of mimicking the processor and of taking over control of the system bus just like a processor
Elden [556K]

The unit which is capable of mimicking the processor and of taking over control of the system bus just like a processor is: C) direct memory access.

<h3>What is computer memory?</h3>

A computer memory can be defined as the available space on an electronic device that is typically used for the storage of data or any computer related information.

<h3>What is a CPU?</h3>

CPU is an abbreviation for central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, calculations, and logical control.

In Computer technology, direct memory access simply refers to the unit which is capable of mimicking the computer's processor and taking over control of the system bus just like a processor.

Read more on processing unit here: brainly.com/question/5430107

#SPJ1

Complete Question:

The __________ unit is capable of mimicking the processor and of taking over control of the system bus just like a processor.

A) interrupt-driven I/O

B) I/O channel

C) direct memory access

D) programmed I/O

5 0
2 years ago
Illustrations that are converted from paper to electronic format are usually
KengaRu [80]

The answer is most definitely C: Scanned

In basic terms, a scan is as a result of a digitized printed document being converted from its paper form into digital data, and the work of a scanner is to scan and send the digitized pictures to your computer. A scanner reduces the time and labor to transform the information from printed materials to digital data.


3 0
3 years ago
Read 2 more answers
Mrs. Dunn shows her students a data range, which has been named "Goals,” covering cells A14 to A25. She tells her students that
love history [14]

Answer:

In this case, Riko and hina made the correct steps.

Explanation:

Rin y Sakura made a wrong step because the range A14 to A25 already exist, and they have selected the option Define name, with this option we can make a new range with a new name.

Riko and Hina have selected the option name manager, with this option we can select the range A14 to A25 with the name "Goals", and to expand it to the new range A14 to A45.

4 0
4 years ago
Other questions:
  • This one too its from computer engineering
    6·1 answer
  • How are publishing used
    10·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • Memory is the place of the computer where data and instructions are stored either permanently or temporarily. True or false.​
    11·1 answer
  • Consider a router that interconnects four subnets: S1, S2, S3, and S4. Suppose all of the interfaces in each of these four subne
    9·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o
    10·1 answer
  • Debugging 2.17.3: Debug: The Two Towers Code Hs
    15·1 answer
  • Intro Programming - Problem(s)
    14·1 answer
  • if a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, i
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!