1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
14

Software that interprets commands from the keyboard and mouse is also known as the

Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
7 0

Answer:

Operating System

Explanation:

Operating system is the basic software that helps different peripherals such as keyboard, mouse and printer etc. It is the most important software of computer or mobile devices. This help to manage all hardware devices, software and other resources connected to the computer.

Keyboard and mouse are the input hardware devices, so it is the main responsibility of operating system to interpret the command of these devices.

You might be interested in
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who ha
Snowcat [4.5K]

Answer:

k12

Explanation:

8 0
2 years ago
4. Contoso, Ltd. has a vigorous Office 365 and Azure cloud-service presence.
OverLord2011 [107]

Answer:

Contoso has an on-premises identity infrastructure. The infrastructure includes servers that run Active Directory Domain Services

Explanation:

3 0
3 years ago
Libby wrote an email to her friend. She pressed Shift and the number key 2 together to enter the email address. Which symbol did
exis [7]

When Libby wrote the email to her friend, she typed the '@' symbol. When pressing SHIFT and 2 together, it pastes this aforementioned symbol. However, there isn't any specific name for the symbol. As a matter as fact, there are several names that this symbol goes by.

The most famous name this symbol is called is the "at symbol" or the "at sign". In terms of a formal name, "commercial at" would be a good one.

Here's an example with the symbol:

[email protected]

This is essentially telling the email server where to send your email. From this, they'll know it's located at brainly.com! It's pretty neat.

4 0
4 years ago
Read 2 more answers
______ includes websites that encourage interaction and connection among people, businesses, and organizations.
Sav [38]
Social Media is right I think. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • Categorize the following relationships into generalization, aggregation, or association. Beware, there may be n-ary associations
    14·1 answer
  • When an IRET instruction is executed, what actiontakes place?
    5·1 answer
  • What is the left are if a slide in a presentation called
    15·1 answer
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • For what kind of shot is a fisheye lens most appropriate?
    8·1 answer
  • How is the internet made?
    7·1 answer
  • Which statistical measurement tools should be
    8·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!