1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
4 years ago
7

What is a type of system software that allows a user to perform maintenance type tasks​

Computers and Technology
1 answer:
wolverine [178]4 years ago
7 0

Answer:

Computer

Explanation:

The type of system software that allows a user to perform maintenance-type tasks​ is a computer.

A computer has many programs and operating systems.

You might be interested in
Skylar is viewing her personal and business calendar in a side-by-side fashion, but she would like to view a single calendar tha
pogonyaev

Answer:

The solution for the current situation in which Skylar is viewing her personal and business calendar in a side-by-side fashion, but she would like to view a single calendar that has appointments and meetings from both personal and business. is:

Configure the Overlay option.

Explanation:

The reasons behind this answer are that in the first place, creating another calendar is too much work. In the second place, the share of the calendars is not going to help her because that would only allow someone else to watch her calendars. However, using the overlay option will allow her to mix them and create one calendar with all her information.

8 0
4 years ago
Where should you endorse a check
yKpoI14uk [10]
This is done by signing your name on the back of the left end of thecheck<span>. </span>You<span> can also limit who can cash it by specifying in your </span>endorsement<span> that it is only to be deposited into your specified account at Provident.</span>
5 0
3 years ago
Read 2 more answers
The term 'dns' stands for
mamaluj [8]
A. Domain Name System
8 0
3 years ago
Read 2 more answers
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
Choose the type of attack that is based on entering fake information into a target network domain name server?
SSSSS [86.1K]

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

4 0
3 years ago
Other questions:
  • In these ones all your finding is the mean(average).
    14·1 answer
  • What are some examples of objects by which you can browse in the select browse option
    6·1 answer
  • Which of the following is a job description for a person with a degree in Information Technology? radiology engineer web develop
    7·1 answer
  • A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the contro
    9·1 answer
  • What is the correct html element for playing audio files?
    11·1 answer
  • Provide three examples of software projects that would be amenable to the waterfall model. Be specific.
    11·1 answer
  • Which of the following would not be stored in a cell ?
    14·1 answer
  • One benefit proprietary licensed software is that it
    9·1 answer
  • (Java) Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6000 minutes is 100
    10·1 answer
  • How to test someone elese internet speed from a distance
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!