1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
5

Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca

lendar. Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities. Operating system software, also called a(n) _____, manages computer hardware and software. Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed. Term malware device drivers utility platform Trojan horses
Computers and Technology
1 answer:
Phoenix [80]4 years ago
5 0

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

You might be interested in
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
What is the full form of ms-word?​
Alex

Answer:

microsoft word

Explanation:

i got certified on it sooooooooooo...

6 0
3 years ago
Read 2 more answers
Mightier than the waves of the sea is his love for you
Inessa05 [86]

cool but kinda creepy ngl

8 0
3 years ago
Why are abbreviations like BRB, TBH, and IDK appropriate in some situations but not in others?
Y_Kistochka [10]

Dont talk in abbreviations to elders, most of them might not know what that means and youll likely have to teach them

7 0
3 years ago
Read 2 more answers
What are other ways you could use the shake or compass code blocks in physical computing projects?
BabaBlast [244]

Answer:there are different ways of quick navigation between files and functions. ... You should use the menu 'Remove file from project' instead of deleting files. ... A Makefile generation tool for Code::Blocks IDE by Mirai Computing

7 0
3 years ago
Other questions:
  • If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
    5·1 answer
  • From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
    5·1 answer
  • Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to emai
    12·2 answers
  • Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
    7·1 answer
  • Use fuel with the _____________ rating recommended by your vehicle manufacturer. A ) Converter B) Emission C) Exhaust D) Octane
    9·2 answers
  • Describe how computers are used to access, retrieve, organize, process, maintain, interpret, and evaluate data and information.
    13·1 answer
  • A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints v
    11·1 answer
  • How can i get games on my chromebook after my school has blocked almost everything... even zoom!
    14·1 answer
  • "If possible, always bring print-outs of your slides for your audience
    7·2 answers
  • Describe the cutting-edge program that is referred to as agile
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!