1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
3 years ago
14

What is utility Software​

Computers and Technology
1 answer:
kirill [66]3 years ago
4 0

Answer:

The Utility Software is system software that helps to maintain the proper and smooth functioning of a Computer System. Some examples are antivirus software, file management tools, compression tools, disk management tools.It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

You might be interested in
The total magnification of a specimen viewed under a compound light microscope is determined by:
zhenek [66]
The total magnification of a specimen viewed under a compound light microscope is determined by <span>multiplying the power of the objective lens times the power of the ocular lens.the eyepiece alone is 10x this one is the right answer hope it helps</span>
8 0
4 years ago
Read 2 more answers
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
What is the CPU Unit of a computer?
denis-greek [22]

Answer:

The computer's central processing unit (CPU) is the portion of a computer that retrieves and executes instructions. The CPU is essentially the brain of a CAD system. It consists of an arithmetic and logic unit (ALU), a control unit, and various registers.

Explanation:

.

4 0
3 years ago
Read 2 more answers
What structures in which lighting heating and other systems are controlled by computers
Ilia_Sergeevich [38]

Museum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

8 0
3 years ago
Write the difference between:
JulsSmile [24]

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

3 0
4 years ago
Read 2 more answers
Other questions:
  • Implement the function maxLoc(), which returns an iterator at the largest element in a list. template typename list::iterator ma
    14·1 answer
  • Word processing programs have different view options that you can use depending on the tasks you’re performing. Which option hel
    11·1 answer
  • What is an individual piece of data called in a database? coding A field B file C record or D tittle
    9·1 answer
  • The ___________ process transforms new memories from a fragile state, in which they can be disrupted, to a more permanent state,
    10·1 answer
  • What are some of the causes for error 1921 when updating?
    11·2 answers
  • Would 2 bits be enough to create a special code for each english vowel
    12·1 answer
  • What is a compiler? O a tool used to integrate multiple software programs O a tool used to extract a single software program fro
    13·2 answers
  • You are evaluating three branch prediction strategies: (1) predict always taken, (2) predict always not taken and (3) use the 2-
    14·1 answer
  • Which formatting options can be changed by selecting the Design tab? Check all that apply.
    7·2 answers
  • Why is my Brainly scanner not work​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!