1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
9

I NEED HELP QUICK

Computers and Technology
1 answer:
Serjik [45]3 years ago
8 0

Answer: keeps confidential documents secure,

displays a GUI, allocates the computer's resources, and retrieves files

Explanation:

The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.

You might be interested in
Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. What will he use?
Goryan [66]

Answer:

A) fuzzer

Explanation:

From the question, we are informed that Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. In this case,he will use a fuzzer. A fuzzer can be regarded as a program that gives in a semi-random data to a program/stack, and it will detect bug. fuzzing testing can be regarded as

software testing process which discover bugs in the software, this is done automatically by giving in input of randomized data to the computer program. Generation of data is done by a generator, while vulnerability identification depends on the tools use in the debugging process.

8 0
3 years ago
What is the difference between Data and information?​
Ksivusya [100]

Answer:

Data is a piece of an Information or a raw form of information while an Information is a processed Data.

Explanation:

An example of Data would be Alphabets of someone's name while the name would be an example of an Information.

On it's own, data makes no sense and needs to be processed to become Information which makes sense.

6 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Discus four importance of applications software​
AlladinOne [14]

Answer:

l hope this helps Good luck.

6 0
3 years ago
Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
borishaifa [10]

Answer:

Jennifer can find the list of all the frequently used program icons on the left pane of the start menu. Below this list, still on the left pane, all programs installed on her computer will be listed in alphabetical order.

Explanation:

I hope this helps

7 0
3 years ago
Other questions:
  • which of the following conditions will maximize the amount of interest you earn A: ahigh interest rate &long time period B:
    12·1 answer
  • Rachel is on her way to an interview for the position of a project manager. She is trying to prepare for this interview by analy
    6·1 answer
  • Assume that play_list refers to a non-empty list, and that all its elements are integers. Write a statement that associates a ne
    7·1 answer
  • Select the correct statement below about database services or database instances:
    5·1 answer
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • According to Google data, among consumers who conduct a local search on their smartphone, how many then visit a store within a d
    7·1 answer
  • What is not true of credit scores?
    11·1 answer
  • Help! Computer Science Discoveries. Hurry its timed
    15·1 answer
  • Which line of code will cause the loop to execute exactly one time?
    13·1 answer
  • Select the one that uses the heading tag correctly. <br><br>a. <br><br><br>b. <br><br>c. <br><br>d.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!