1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
3 years ago
12

What software maintain and increase the efficiency of a computer system?

Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
6 0

Answer:

Computer maintenance software

Explanation:

Computer maintenance software perform optimization tasks such as the removal of files that are not used in the operation of the system or by the applications in the system such as memory dumps, temporary files, and old log files

Computer maintenance software can also perform cleaning of the registry of the computer such that clutter in the computer registry is removed

You might be interested in
What are the cause of eye strain during computer usage?
Natasha2012 [34]
It happens because your eyes follow the same path over and over. And it can get worse the longer you continue the movement. When you work at a computer, your eyes have to focus and refocus all the time. They move back and forth as you read. You may have to look down at papers and then back up to type. Your eyes react to changing images on the screen to create so your brain can process what you’re seeing. All these jobs require a lot of effort from your eye muscles. And to make things worse, unlike a book or piece of paper, the screen adds contrast, flicker, and glare.

You’re more likely to have problems if you already have eye trouble, if you need glasses but don't have them, or if you wear the wrong prescription for computer use.

Computer work gets harder as you age and the lenses in your eyes becomes less flexible. Somewhere around age 40, your ability to focus on near and far objects will start to go away. Your eye doctor will call this condition presbyopia.

5 0
3 years ago
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Ill give alot of points if you answer: How do I get a 100 dollar ps4
stepladder [879]
Uh how do you get a little blue box in a sandwich
8 0
3 years ago
Read 2 more answers
How long does it take to design and program a character?
Kipish [7]
It takes about 5 days I believe 
6 0
3 years ago
What are 7 key traits for knowing your audience
evablogger [386]
Ask them what's ur name and get to the know them i have nothing really.
5 0
3 years ago
Read 2 more answers
Other questions:
  • How to find i with superposition method
    8·1 answer
  • What are the advantages and disadvantages of malware maintenance?
    12·1 answer
  • HELP PLZ !!
    13·1 answer
  • To create a pull quote, how should a user format the text?
    6·2 answers
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • What happens when a computer gets a virus?
    6·2 answers
  • business information management professionals also perform duties of _ information system professionals
    11·1 answer
  • Help me guys plssssss​
    10·1 answer
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
  • Location of a video or photoshoot is not important when it comes to preplanning the shoot.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!