1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
8

Select four programs that make up system software.Select four programs that make up system software.

Computers and Technology
1 answer:
Alenkasestr [34]3 years ago
5 0

Operating system

Boot code

Device drivers

Utilities

You might be interested in
What is referred to by the phrase “Web 2.0”?
Tresset [83]

Answer:

Web 2.0

the second stage of development of the World Wide Web, characterized especially by the change from static web pages to dynamic or user-generated content and the growth of social media.

Explanation:

It refers to websites that emphasizes user-generated content, ease of use,  compatible with other products, systems, and devices for end users.

4 0
3 years ago
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
What can you hold in your left hand but not in your right? for creese7911 and maranda66
Drupady [299]

Answer:

You're right hand or Left too

Explanation:

Because some people can hold some stuff on there hands

8 0
3 years ago
Read 2 more answers
Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?
Tanzania [10]

Answer:

A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.

The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).

SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).

SAN architecture

A storage area network consists of a fabric layer, host layer and storage layer.

6 0
2 years ago
Write a function named countEvens that counts and returns the number of even integers in an array. The function must have this h
skelet666 [1.2K]

Answer:

function countEvens(list) {

   // IMPLEMENT THIS FUNCTION!

var even = [];

 

for(var i = 0; i < list.length; i++){

 if (list[i] % 2 == 0){

   even.push(list[i]);

   

 }

}

 return console.log(even)

}

var list = [ 17, 8, 9, 5, 20 ];

var count = countEvens(list);

Explanation:

The programming language used is JavaScript.

An even variable is initialized, to hold  the even variables within list.

A FOR loop loop iterates through all the elements in the list, an IF statement is used to check using the modulo division to check if the elements in the list are even.

The even elements are appended to the even list using .push() method.

Finally, the function returns the even list and outputs the list to the log using console.log(even) .

A list is created and the function is called.

4 0
3 years ago
Other questions:
  • Input _____ is a template or pattern that restricts data entry and prevents errors.
    7·1 answer
  • Which command group does a user need to access the Formula dialog box?
    11·1 answer
  • Can somebody please halp meeee?? I'm doing Web design.
    12·2 answers
  • Why is outfitting a workplace with video games in a technology development company consiered a strategic use of money
    14·1 answer
  • Use the Law of Sines to solve the triangle. Round your answers to two decimal places.
    6·1 answer
  • You are in charge of an event at work. You want to plan and schedule events and resourse. What type of software should you use?
    14·2 answers
  • What are the economic, social, political and cultural effects of the West Indian Day Parade
    12·1 answer
  • When a laptop internal device fails, what three options can you use to deal with the problem?
    7·1 answer
  • what is the reason for assigning the management of file sharing, security, and quotas to administrators . why would it be pruden
    12·1 answer
  • A single access point, and the set of hosts it serves, is called a(n) ________. BSS BSSID ESS None of these
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!