____ are utility programs that control peripheral devices such as a keyboards, printers, or scanners.
A. Device drivers
B. Service packs
C. Patches
D. Apps
Answer: A
You might also like to view...
The number of tables required for a report depends on the design of the database system being used
Indicate whether the statement is true or false
The ____ root key contains profile information for each user who has logged onto the computer.
A. HKEY_USERS B. HKEY_LOCAL_MACHINE C. HKEY_CURRENT_USER D. HKEY_CURRENT_CONFIG
?Hardware-based security controls include _____.
A. ?password fields B. ?online forms C. ?system patterns D. ?biometric devices
Your network is configured in a hub-and-spoke topology. You want to control the flow of replication traffic between sites, specifically reducing the traffic across network links between hub sites to reach satellite sites. What should you configure?
A. Site link bridges B. Bridgehead servers C. Connection objects between domain controllers in each site D. NTDS settings