1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
12

central, secure database in which Windows stores hardware and software configuration information and system security policies is

______________________. This includes information about device drivers, setup programs, hardware profiles and user profiles.
Computers and Technology
1 answer:
Ilya [14]3 years ago
8 0

Answer:

The Registry

Explanation:

The registry is a centralized and secure database whereby Windows stores the overall configuration information of the hardware including the configuration information of the software as well as the system security policies. The Components that make use of the registry include the device drivers, Windows kernel, hardware profiles, setup programs, and user profiles.

You might be interested in
3. An open source software operating system<br> TYPE THE ANSWER
kkurt [141]

Answer:

allows users to adapt it for any purpose often open to the public

3 0
3 years ago
Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
ElenaW [278]

Answer:

$380.64

Explanation:

So he what you do is take $488 multiply it by 22% to get $107.36 you then subtract $488 from $107.36 to get what he was paying before premium increase which is $380.64

7 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
What tool is provided in Windows to facilitate sharing data objects between applications and computers?
Anton [14]

Answer:

Component services

Explanation:

In Windows, components services are integrated into the Administrative Tools and are used to configure certain COM (Component Object Model) components and applications. They are also used to ;

i. assign roles to users and groups.

ii. facilitate data sharing between applications and computers by processes such as pooling, pausing, resuming and recycling applications.

7 0
3 years ago
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
nadezda [96]
The answer to the question above is the last option: ETHICAL. The IT code of conduct, which is a written guideline, helps in determining whether a specific action is acceptable or ETHICAL. Basically, the IT code of conduct's purpose here is to maintain that the actions being done to the accepted and proper practices.
8 0
4 years ago
Other questions:
  • A mobile base station (BS) in an urban environment has a power measurement of 15 µW at 175 m. If the propagation follows an inve
    9·1 answer
  • Where is the bios in the soft ware or hard ware
    13·2 answers
  • Write a fragment of code that reads in integers from standard input, until end-of-file and sends their (floating point) average
    14·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    14·1 answer
  • Discuss the following
    14·1 answer
  • Rewrite the following using if else statement:
    14·1 answer
  • 1) a program that is designed to perform only one task.
    11·1 answer
  • PLS ANSWER. MARKING CORRECT ANSWER AS BRAINLIEST
    11·1 answer
  • The result of processing data ​
    10·1 answer
  • * Describe the five components of a<br> computer
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!