1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
5

Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca

lendar. Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities. Operating system software, also called a(n) _____, manages computer hardware and software. Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed. Term malware device drivers utility platform Trojan horses
Computers and Technology
1 answer:
Phoenix [80]4 years ago
5 0

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

You might be interested in
Create a Python program as described below and save it in a file named bool. You should use IDLE or similar environment to creat
Eva8 [605]

PYTHON CODE

# function to compare a and b
def compare(a,b):

    # if a is greater than b , return 1
    if a > b:
        return 1

    # if a and b are equal, return 0
    elif a == b:
        return 0

    # if a less than b , return -1
    elif a < b :
        return -1


# testing
if __name__=="__main__":

    # calling the compare function with a and b
    print('compare(5,2) %d'%compare(5,2))
    print('compare(2,5) %d'%compare(2,5))
    print('compare(3,3) %d'%compare(3,3))

    # getting values for a and b
    a=int(input("Enter the value for a: "))
    b=int(input("Enter the value for b: "))

    print('compare(%d,%d) %d'%(a,b,compare(a,b)))

(see attachment for output)

8 0
3 years ago
Give three general reasons for the importance of computer networking.
LiRa [457]
I think the First reason is; it provides the best way of business communication.
Second reason, streamline communication
Third reason cost effective resource sharing :) (hope this helps)
5 0
2 years ago
Which of the following statements is false? Question 4 options: By convention class names begin with an uppercase letter, and me
amm1812

Answer:

Instance variables can be declared anywhere inside a class.

Although there isn't any rule to declare instance variables before methods, and they can be declared anywhere in the class, they cannot be declared inside method definitions of class.

///////////////////////////////////////////////////////////////////////////////////////////////////////////

<em>By convention class names begin with an uppercase letter, and method and variable names begin with a lowercase letter.</em> - True.

<em>Instance variables exist before methods are called on an object, while the methods are executing and after the methods complete execution.</em> - True.

<em>A class normally contains one or more methods that manipulate the instance variables that belong to particular objects of the class.</em> - True

8 0
3 years ago
Read 2 more answers
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Which of the following is not hardware? Question 7 options: A) Wireless network router B) Printer C) Virus Scanner D) Flat-panel
jok3333 [9.3K]

the answer is virus scanner which is not hardware but software because if you didn't know hardware is stuff like a monitor a mouse a battery a case that's all stuff you can generally touch even the hardware inside the computer you can touch where as virus scanner you can not touch because its software again my point being its software NOT hardware

8 0
3 years ago
Other questions:
  • Ideation includes all of the following EXCEPT
    5·1 answer
  • In Microsoft Word you can access the _______ command from the "Mini toolbar
    11·1 answer
  • Find some search engine as many that you can find
    9·1 answer
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • In the United States, everyone is guaranteed work true or false
    13·1 answer
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • What are the paparazzi?
    8·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • David is preparing a report to show the percentage increase in population in the United States in the last five years. Which fea
    12·1 answer
  • It is important to consider design details when creating an api because: ______________
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!