1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
2 years ago
7

________ software consists of operating systems, utilities, device drivers, and language translators.

Computers and Technology
1 answer:
Hunter-Best [27]2 years ago
3 0

Answer:

"System"

Explanation:

<u>System</u> software consists of operating systems, utilities, device drivers, and language translators.

(not much explanation as it was a fill in the blank which explains itself haha)

Have a nice day!

    I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

You might be interested in
When you buy software, you then own it and can do anything you’d like with it, including giving it to friends to install on thei
luda_lava [24]
No. When you purchase software, it is usually distributed under a license that only lets you do certain things with it. It is usually only for personal use, but other times the manufacturers of the software will allow you to freely redistribute it.
3 0
3 years ago
When using a public computer or network, you should always _______. A. install a firewall. B. run an anti-virus program beforeha
SpyIntel [72]
Answer is c log out of any sites you have logged into ..bc it's a public computer
5 0
3 years ago
Read 2 more answers
What is the largest computer file size, megabyte , gigabyte, terabyte
STatiana [176]

The terabyte is the largest computer file size because it has 1024 gigabytes each of which has 1024 megabytes. Therefore, the the terabyte can be subdivided into megabytes or gigabytes.

3 0
3 years ago
Read 2 more answers
FIRST AMSWER GET BRAINLIEST​
MA_775_DIABLO [31]

Answer:

agile --> business modeling

RAD --> pair programing

waterfall --> deployment

spiral --> risk analysis

v-shaped model --> integration testing

not too sure about this but i tried

4 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • A simple way to think of the Excel application is as a giant ______.
    5·2 answers
  • Describe a new career in computer science that may be created in the future. Include supporting evidence in your response that s
    13·1 answer
  • For businesses and organizations under recent compliance laws, data classification standards typically include private, confiden
    11·1 answer
  • The proxy statement issued by a corporation is a requirement of: a. The Securities &amp; Exchange Commission (SEC) b. The Financ
    5·1 answer
  • Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol
    15·1 answer
  • Why is this cite so rigged
    10·1 answer
  • What effect does social media have on teens?
    10·2 answers
  • What is wrong with a MOV BL, CX instruction?
    6·1 answer
  • Evaluate the merits of a hard disk drive or a solid state drive to use as the secondary storage
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!