1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
3 years ago
5

Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca

lendar. Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities. Operating system software, also called a(n) _____, manages computer hardware and software. Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed. Term malware device drivers utility platform Trojan horses
Computers and Technology
1 answer:
Phoenix [80]3 years ago
5 0

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

You might be interested in
N, or central processing unit, is also known as the
Rzqust [24]
CPU is the Answer to this question.
6 0
3 years ago
Read 2 more answers
Management of software development consist of?
JulsSmile [24]

Answer:

d. All of the above

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

In Computer science, management of software development consist of;

a. Process: it involves the stages through which a software application is analyzed, designed, developed, tested, etc.

b. People: it refers to the individuals involved in the software development process.

c. Project: it's the entirety of the stages a software goes through before it gets to the end user.

5 0
3 years ago
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Suppose you want to view a document that has several headings. what view would you use?
bija089 [108]
Um i think outline. :)
5 0
3 years ago
There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
sergeinik [125]

Answer and Explanation:

Reliability is important because if the service lacks  lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.

Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.

Jitter is the variation in delay for packets belonging to the same flow.

High Jitter: difference between delays is large

Low jitter: difference between delays is small.

Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.

4 0
3 years ago
Other questions:
  • A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
    10·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • In JAVA,
    10·1 answer
  • Please Help!! How to code this in Python?
    11·1 answer
  • Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
    15·2 answers
  • Fill in the blanks with given words:{system unit / desktop / laptop / tablet / smartphone}1. A _____ can be as powerful as a des
    11·1 answer
  • What type of device is the keyboard?<br><br> Output<br> Input<br> Monitoring<br> Software
    7·2 answers
  • What is a boolean in Java
    5·1 answer
  • What is the Role of an algorithm?
    11·1 answer
  • The following is a function:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!