1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
9

Describe how keyboard software works and which problems does keyboard software need to handle?

Computers and Technology
1 answer:
Anastaziya [24]3 years ago
3 0

Answer:

The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.

No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.

You might be interested in
Compare and contrast how the roles of women and men in society are changing​
Tems11 [23]

Answer:

Society is run with the everyday changing and evolving roles of men and women. Taking instances from the past, it can be very well said that the society has seen an evolution in the changing roles of men and women.

In ancient times, men were dominant. Men were only meant to earn and provide for their family and women were only meant to cook, clean their house and raise the kids and looking after their domestic animals. But with the advancement of time, women began to grow in the industry and business field. Slowly and gradually taking baby steps, women have managed to climb a mountain facing each and every hurdle of stereotypes and rituals to prove their worth. Now it can be very well said that women are no less than men and have proper significance in growth of society ethically and economically as well.

4 0
3 years ago
Which of the following is Tynker an example of?
dangina [55]

Answer:

binary code

Explanation:

correct me if i’m wrong :)

6 0
3 years ago
Read 2 more answers
Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u
Archy [21]

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

5 0
1 year ago
1) In your own words, explain what a browser is. 2) Why is it important to keep your browser up to date?
marta [7]

Answer:

A browser is a software that is used to access the internet. A browser lets you visit websites and do activities within them like login, view multimedia, link from one site to another, visit one page from another, print, send and receive emails, among many other activities

The most important reason to keep your browser up-to-date is for your own safety and security, and that of your computer. ... If you're a Firefox user, your browser will remind you to update your add-ons whenever new versions become available.

Malicious hackers and Web sites can exploit security flaws in browsers and infect your computer with harmful programs, trojans, and viruses. Regular updates to your browser fix security problems when they are detected, and make your computer safer from those types of attacks.

6 0
4 years ago
To add a glow effect to WordArt text, which of the following should be done?
g100num [7]
Number 2 is the correct answer
8 0
3 years ago
Other questions:
  • Discuss 2D gameplay and how new platforms such as cell phones are taking advantages of this renewed market
    5·1 answer
  • For a panoramic photograph, you will more than likely want to control the exposure of the photograph yourself rather than lettin
    11·1 answer
  • A method variable a class variable with the same name. a) acquiesces to b) destroys c) overrides d) alters
    14·1 answer
  • Which of the following is NOT true about high-level programming<br> languages?
    9·2 answers
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • javascript Write a program to calculate the credit card balance after one year if a person only pays the minimum monthly payment
    7·1 answer
  • A bear is an animal and a zoo contains many animals, including bears. Three classes Animal, Bear, and Zoo are declared to repres
    12·1 answer
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • Commercials are short media advertising that persuades a consumer to buy/use their product/service?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!