1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
9

a __________ uses software and/or hardware to prevent unwanted access to a computer or computer system.

Computers and Technology
1 answer:
Crank3 years ago
6 0
Anti virus software
You might be interested in
What is the binary system?
STatiana [176]

Answer:

In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" and "1". The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit.

7 0
3 years ago
Read 2 more answers
What is the impact of information technology in your daily life?
yawa3891 [41]
Technology affects people's lives differently.
Some are bad and some are good.
But for me, technology gives us a chance to collaborate and connect even if we are miles away.
People are opening their mind to new kind of knowledge that can help us improve and grow.
3 0
3 years ago
Which of the following is no longer necessary when you use HTML5 to develop Webpages? Please Hurry This Is For An Assignment due
zlopas [31]

Answer:

Installing a third-party plug-in to include video

Explanation:

5 0
3 years ago
25 POINTS! PLEASE ANSWER! Karrie would like to draw attention to some short statements in her document. What is the best way to
Keith_Richards [23]

Answer: I would say D. because it is highlighted text draws the attention of the reader

Explanation:

7 0
3 years ago
Read 2 more answers
Precautionary measures to be observed when using ICT tools​
Dafna11 [192]

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

  1. Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.
  2. Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage
7 0
3 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • What effects will the different types of lighting produce on mountains?
    15·1 answer
  • Tara referred to various information sources while writing her research paper. How can she acknowledge these sources in her docu
    8·1 answer
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • What is data? why is it important to collect data ? explain the points.​
    10·1 answer
  • What does this function do in the code?
    5·2 answers
  • Is monitor is a television​
    5·2 answers
  • Which statement best describes what happens when a computer starts?
    9·1 answer
  • To verify a Windows system meets the minimum processor and memory requirements to install software, use the ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!