____ are utility programs that control peripheral devices such as a keyboards, printers, or scanners.

A. Device drivers
B. Service packs
C. Patches
D. Apps


Answer: A

Computer Science & Information Technology

You might also like to view...

The number of tables required for a report depends on the design of the database system being used

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ root key contains profile information for each user who has logged onto the computer.

A. HKEY_USERS B. HKEY_LOCAL_MACHINE C. HKEY_CURRENT_USER D. HKEY_CURRENT_CONFIG

Computer Science & Information Technology

?Hardware-based security controls include _____.

A. ?password fields B. ?online forms C. ?system patterns D. ?biometric devices

Computer Science & Information Technology

Your network is configured in a hub-and-spoke topology. You want to control the flow of replication traffic between sites, specifically reducing the traffic across network links between hub sites to reach satellite sites. What should you configure?

A. Site link bridges B. Bridgehead servers C. Connection objects between domain controllers in each site D. NTDS settings

Computer Science & Information Technology