1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
5

Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca

lendar. Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance. Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities. Operating system software, also called a(n) _____, manages computer hardware and software. Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed. Term malware device drivers utility platform Trojan horses
Computers and Technology
1 answer:
Phoenix [80]4 years ago
5 0

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

You might be interested in
Write a program which will -
Hitman42 [59]

Answer:

down below

Explanation:

score = input() # gets student's score input

max = input() # gets max number

percent = (score/max)*100 # multiply by a hundred to get percentage

if percent > 52: # checks if percent is greater than 52

  print("well dont you have at least a grade 5")

else # if percent is less than or equal to 52 it will print this instead

  print("Unlucky, you need to revise more for the next test.")

THIS PART IS NOT CODE:

make sure you indent/tab the print statements or else you'll get an error

6 0
3 years ago
Can anyone do this flowchart chart for me could send it to my insta - chelsea.ejb
arlik [135]

Answer:

see attached picture

Explanation:

An algorithm would be:

if hours < 10 then bonus = 0

else if hours <= 15 then bonus = 1000

else if hours <= 20 then bonus = 1500

else if hours <= 25 then bonus = 2000

else if hours <= 30 then bonus = 3000

else bonus = 5000

6 0
3 years ago
You can customize backdrops in Scratch, adding text or freestyle drawings over the initial image
sveticcg [70]

Answer:

A. True

Explanation:

ive done this myself

https://scratch.mit.edu/projects/395142260/

3 0
3 years ago
The part of the computer that provides access to the internet is the
Arlecino [84]
<span>The part of the computer that provides access to the internet is the "modem".
</span>

A modem refers to a hardware device that enables a PC to send and get information over a phone line or a link or satellite association. On account of transmission over a simple phone line, which was at one time the most prevalent approach to get to the internet, the modem changes over information amongst simple and computerized designs progressively for two-way network communication.
4 0
3 years ago
Read 2 more answers
All of the following are potential benefits of blogging except
Archy [21]
The answer should be C because most bloggers sacrifice privacy for content.
8 0
3 years ago
Read 2 more answers
Other questions:
  • At what point is an idea protected by copyright?
    7·2 answers
  • Bitnet, one of the predecessors of the internet was launched in 1981. what does bitnet stand for?
    12·1 answer
  • What are the commands used in windows 2012 to mount the nfs share on the linux server?
    8·1 answer
  • If you delete an imessage does the other person see it
    12·1 answer
  • Write a program to calculate the area of a triangle whose base is 10cm and height is 6cm
    6·1 answer
  • The following code will create a zombie child process because the child process is terminated and the parent process is busy in
    7·1 answer
  • What describes a group of cells?<br> O crowd<br> Orange<br> O set<br> gangle
    7·2 answers
  • Quiénes se benefician de la realidad virtual​
    12·1 answer
  • Which programming languages are the best choices for desktop applications? Select 3 options.
    8·2 answers
  • You have a team member on a remote project who is not fluent in English and
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!