1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
9

Unwanted or unneeded software included by manufacturers on new computers is called

Computers and Technology
1 answer:
Travka [436]3 years ago
5 0
The answer is called bloatware. This is unneeded files that are actually on the computers which are already there even if it's new. It doesn't have any essential function and sometimes is a trial version. The application also adds up space which limits your free space storage. In other words, because it has no significant tasks to handle it is unnecessary, but it only serves as an additional profit to the company once it is purchased by the buyer.

Bloatware may also come especially in adware where a lot of extension applications are sometimes automatically installed after it is allowed to operate in just a click. The only solution for a bloatware is to uninstall it.  .
You might be interested in
Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbp
tino4ka555 [31]

Answer:

Category 3 (CAT3) Unshielded Twisted Pair cable

Explanation:

A Category 3 (CAT3) Unshielded Twisted Pair cable is a cable that makes use of the conductivity of copper to transmit data and power. These cables are an older standard for Ethernet cables and can handle data speeds of up to 10mbps.The succeeding standard for Ethernet cables include CAT5 which has speeds of up to 100 mbps, CAT 3 is mostly used in applications where speed is not of great importance such as in PBXs and VoIP telephone systems.

6 0
3 years ago
Read the section, "Junior Year." Why would someone chose to complete an apprenticeship after high school? How many occupations c
Tamiku [17]

An apprenticeship prepares you for a career through a structured program of on-the-job learning with classroom instruction, while you work and earn a salary. The programs can last from one to six years and you can choose careers in areas such as telecommunications, health care, computing, business support and the arts. The most common apprenticeships are in construction and manufacturing. If you like to work with your hands and your mind, you might want to consider an apprenticeship after high school. More than 850 occupations can be learned on the job through an apprenticeship.

7 0
3 years ago
Read 2 more answers
Which of the following best describes the difference between software and hardware?
s344n2d4d5 [400]

I believe the answer is A.

7 0
3 years ago
Read 2 more answers
Consider the code fragment below (with nested loops). int sum = 0;for (int i = 1; i < 5; i++) for (int j = 1; j <= i; j++)
sammy [17]

Answer:

Option d is the correct answer for the above question.

Explanation:

  • The first loop of the program has a second loop and then the statement. In this scenario, the second loop executes for the value of the first loop and the statement executes for the value of the second loop.
  • The first loop executes 4 times, Then the second loop or inner loop executes n times for the n iteration of the first loop, for example, 1 time for the first iteration of the first loop, 2 times for the second iteration of the first loop and so on.
  • Then the inner loop executes (1+2+3+4) iteration which gives the result 10 iterations.
  • The sum initial value is 0 and the "sum++", increase the value of the sum by 1.
  • So the value of the sum becomes 10 after completing 10 iterations of the inner for loop.
  • Hence the 10 will be the output. So the Option d is the correct answer while the other is not.
3 0
3 years ago
______ have become a common and easily created form of malware that are creating using applications such as Visual Basic or VBSc
Helen [10]

Answer:

Macro Viruses

Explanation:

Macro Viruses have become a common and easily created form of malware that are creating using applications such as Visual Basic or VBScript.

7 0
3 years ago
Other questions:
  • What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
    7·1 answer
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • Dwight <br> d. eisenhower was impressed with germany's network of highways and how it __________.
    15·1 answer
  • When using the Simple Query Wizard, Kirsten wanted to transfer all of her available data to a new table. She should click
    14·1 answer
  • Which of the following should be performed to prove the value of a security awareness training program?
    8·1 answer
  • 6-1) (Math: pentagonal numbers) A pentagonal number is defined as n(3n–1)/2 for n = 1, 2, . . ., and so on. Therefore, the first
    10·1 answer
  • Which of the following is an example of joint problem solving?
    12·1 answer
  • What is a cell? how is it referred?​
    8·1 answer
  • What is a presentation program? Name any<br> presentation programs.
    10·1 answer
  • Explain download as used in computing environment.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!