1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
3 years ago
5

Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca

lendar. Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities. Operating system software, also called a(n) _____, manages computer hardware and software. Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed. Term malware device drivers utility platform Trojan horses
Computers and Technology
1 answer:
Phoenix [80]3 years ago
5 0

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

You might be interested in
Because its radio waves can pass through walls or desktops,
jeka57 [31]
Bluetooth i believe, not too sure however but its ur best bet
5 0
3 years ago
In this assignment, you are provided with working code that does the following: 1. You input a sentence (containing no more than
Olegator [25]

Answer:

The code is given below,

import java.io.File;

import java.io.FileInputStream;

import java.util.ArrayList;

import java.util.List;

import java.util.Scanner;

public class SentenceUtilsTest {

public static void main(String[] args) {

List<SentenceUtils> sList = new ArrayList<SentenceUtils>();

try{

File file = new File(args[0]);

Scanner scanner = new Scanner(new FileInputStream(file));

while(scanner.hasNextLine()){

String sent = scanner.nextLine();

if(sent.trim().length() > 0){

SentenceUtils sUtils = new SentenceUtils(sent);

sList.add(sUtils);

}

}

System.out.println("File that was read:" + args[0]);

System.out.println("File contains " + sList.size() + " sentences.\n");

System.out.println("Sentences reports:\n");

for(int line = 0; line < sList.size(); line++){

System.out.println("Sentences " + line +";");

System.out.println(sList.get(line).getSentence());

SentenceUtils lineText = sList.get(line);

String[] tokens = lineText.getTokens();

for(int id = 0; id < tokens.length; id++){

System.out.println(id+":"+tokens[id]);

}

String[] shingles = lineText.getShingles();

for(int id = 0; id < shingles.length; id++){

if(shingles[id] != null){

System.out.print(shingles[id]+" ");

}

}

System.out.println("\n");

}

}catch(Exception ex){

ex.printStackTrace();

}

}

}

package sentenceutils;

import java.util.ArrayList;

import java.util.List;

public class SentenceUtils {

private String sentence;

private String[] tokens;

private String[] shingles;

public SentenceUtils(String s){

this.sentence = s;

generateTokens();

generateShingles();

}

private void generateShingles() {

List<String> shinglesList = new ArrayList<String>();

for (int index=0; index < sentence.length()-1; index++) {

shinglesList.add( sentence.charAt(index) +""+sentence.charAt(index+1) );

}

shingles = new String[sentence.length()];

shinglesList.toArray(shingles);

}

private void generateTokens() {

tokens = sentence.split(" ");

}

public String getSentence() {

return sentence;

}

public String[] getTokens() {

return tokens;

}

public String[] getShingles() {

return shingles;

}

}

4 0
3 years ago
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
Which of the following is a basic strategy for minimizing the opportunity for error in a process?
dolphi86 [110]

Answer: b) Standardizing how the process is completed

Explanation:

Occurrence of error in a process can be due to several reason like human error,equipmental error, qualitative error etc.It includes internal as well as external factor.To eliminate the occurrence of fault in process, it is better to follow standard and systematic working in uniform way so that any kind of manipulation and modification does not lead to error.

  • Other options are not appropriate because trying harder will not correct chances of fault rather it will only waste the efforts.Not depending on technology is also not the solution to gain accuracy in process.
  • Thus, the correct option is option(b).
6 0
3 years ago
When searching for specific record information, sometimes you see duplicate files with the same name that have different data ru
mel-nik [20]

Answer:

True is the right answer for the above question.

Explanation:

When a user created a new file with the same name which is already on the disk, then a pop-up window will alert the message to change the name of the file or a computer system replace the old files with a new one. It means that no files exist on the system with the duplicate name.

If it happens in some case then there must be possible that there is one file written in a disk one two places with the different data at the same time. It is because of system error.

The question concept also means the same which is described above. Hence the question is a true statement.

4 0
3 years ago
Other questions:
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part (a number between 0
    8·1 answer
  • Data ____ travel over the Internet from router to router until reaching their destinations.
    7·1 answer
  • python (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. T
    12·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • 5. Write few lines of code that creates two arrays with malloc. Then write a statement that can create a memory leak. Discuss wh
    8·1 answer
  • Robert works in a call center and receives a call from Kathy. Kathy says she can no longer access the online reporting applicati
    13·1 answer
  • Why are I/O (input/output operations) important in database environment?
    8·1 answer
  • Visual basis,C, C++ and Java are all examples of computer programming ________.
    15·1 answer
  • Karl comes across confidential information. What should he do with it? A. Manipulate the information in his favor B. Sell the in
    12·1 answer
  • The portion of memory that is more or less permanent is called __________ memory.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!