1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
14

List safety conditions when downloading shareware, free free where, or public domain software

Computers and Technology
1 answer:
Anit [1.1K]3 years ago
6 0

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

You might be interested in
In the relocatable dynamic partitions scheme, the Memory Manager relocates programs to gather together all of the empty blocks a
kodGreya [7K]

Answer:

True

Explanation:

In computer, Memory management is a form of resource management, its essential requirement is to provide ways to dynamically allocate portions of memory to programs at their request, and to free it to be used again when not needed. Memory management is critical to any advanced computer system that uses more than a single process.

Several methods that has increased effectiveness of memory management like the Virtual memory systems which separates the memory addresses used by a process from actual physical addresses, thus allowing the separation of processes and increasing the size of the virtual address space beyond the available amount of Random Access Memory (RAM) using paging or swapping to secondary storage have been used.

"The Memory Manager relocates programs to gather together all of the empty blocks and compact them to make one block of memory large enough to accommodate some or all of the jobs waiting to get in from your question.

6 0
3 years ago
Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
ELEN [110]

Answer: 1. False 2. True

Explanation: Piracy in any capacity is in fact illegal and might possibly be a felony I'm not quite sure. But it's just like stealing a toy from the store, somebody worked hard to make it and you best be paying for it.

Software licenses on the other hand usually give you permission to install the software on one or many machines depending on the license you purchase, but usually, if you paid for it once, you can use it anywhere.

8 0
3 years ago
Read 2 more answers
A malfunction in one computer will not crash this network topology.(multiple answer)
navik [9.2K]
The answer is c: partial mesh
4 0
3 years ago
1. How many questions are on the Consensus Assessment Initiative document?
Angelina_Jolie [31]

Answer:

i have no idea

Explanation:

3 0
3 years ago
To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microsec
stepladder [879]

Answer: D. Multiply the number of microseconds by 1,000.

Explanation:

In order to convert microseconds to nanoseconds, it should be noted that one should multiply the number of microseconds by 1,000.

For example, if we want to convert 12 microseconds to nanoseconds. This will be:

= 12 × 1000

= 12000 nanoseconds.

Therefore, with regards to the information given above, the correct option is D.

5 0
3 years ago
Other questions:
  • What are the advantages and disadvantages of using thermoset plastics
    14·1 answer
  • The English (or Shakespearean) sonnet form includes three quatrains and a couplet two quatrains and a couplet two quatrains and
    15·1 answer
  • Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3.
    11·1 answer
  • How to do pseudocode and flowchart in BMI ( computer programming ​
    11·1 answer
  • list the sixth external parts of a computer system and identify which are output and which are input devices
    14·2 answers
  • Top Down Design makes it easier to solve a problem by:___________
    10·1 answer
  • A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a, from a d
    11·1 answer
  • While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report
    7·1 answer
  • The government now requires physicians to store patient information in databases that are accessible in multiple locations by mu
    8·1 answer
  • How to add a legend to a graph in excel?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!