________ is a program that extends the operations a computer can perform beyond the hardwired machine instructions.

Fill in the blank(s) with the appropriate word(s).


operating system

Computer Science & Information Technology

You might also like to view...

Comments are typed in ____.

A. objects B. notes C. balloons D. thumbnails

Computer Science & Information Technology

Anne, the Chief Executive Officer (CEO), has reported that she is getting multiple telephone calls from someone claiming to be from the helpdesk. The caller is asking to verify her network authentication credentials because her computer is broadcasting across the network.This is MOST likely which of the following types of attacks?

A. Vishing B. Impersonation C. Spim D. Scareware

Computer Science & Information Technology

A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.

a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal

Computer Science & Information Technology

When a blend is created, a path is drawn between the starting and ending objects. This path is called what?

A. stroke B. backbone C. direction line D. spine

Computer Science & Information Technology