1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
2 years ago
11

What kind of software consists of the programs that control or maintain the operations of a computer and its devices?

Computers and Technology
1 answer:
patriot [66]2 years ago
6 0
Instructional coding hope this helps
You might be interested in
Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the
Tom [10]

Answer:

Gramm-Leach-Bliley Act

Explanation:

Under the Gramm-Leach-Bliley Act, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

The law stipulates that for any consumer with a financial institution, the financial institution should make provision of a privacy notice. This privacy notice outlines in explicit details the following; what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

This was done in order to protect the consumer right and the right of the financial institution.

7 0
2 years ago
Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
qaws [65]

Answer: Rootkit

Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.

Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.

Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .

Thus ,the correct option is rootkit.

8 0
2 years ago
Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant
Ber [7]
I believe it is referred to as 'rootkit'
5 0
3 years ago
A typical serial cable has
stepan [7]
A typical serial cable it has transfer information from between 2 devices using a serial communication protocol. The form of connectors it depends to particular serial port to be used. 

Hope it helped you!


-Charlie
8 0
2 years ago
Assume that a is an array of two or more integers, and that b and c are integers.
deff fn [24]

Answer:

B contains the highest value in the array

Explanation:

Such that the first if statement will execute and like wise the second if statement will execute thereby increasing the value of b

4 0
3 years ago
Other questions:
  • In this story, the reader is strongly encouraged to believe that Skidmore is guilty of poisoning his brother Manchester. Explain
    6·1 answer
  • Write an Enlistee class that keeps data attributes for the following pieces of information: • Enlistee name • Enlistee number Ne
    7·1 answer
  • In order to plan George's birthday, his father gave him a list of people who attended his birthday for the last five years. What
    5·1 answer
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • Your desktop, internet explorer, and the media player can be started from this area on most computers
    9·1 answer
  • Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use
    6·1 answer
  • What is the FTC used car rule
    12·1 answer
  • Write a program that asks the user to enter a student's name and 8 numeric tests scores (out of 100 for each test). The name wil
    13·1 answer
  • What simple machine is most often used to lift the blinds on a window?
    8·2 answers
  • Select each of the steps involved in creating a table in a presentation.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!