________ is a program that extends the operations a computer can perform beyond the hardwired machine instructions.
Fill in the blank(s) with the appropriate word(s).
operating system
You might also like to view...
Comments are typed in ____.
A. objects B. notes C. balloons D. thumbnails
Anne, the Chief Executive Officer (CEO), has reported that she is getting multiple telephone calls from someone claiming to be from the helpdesk. The caller is asking to verify her network authentication credentials because her computer is broadcasting across the network.This is MOST likely which of the following types of attacks?
A. Vishing B. Impersonation C. Spim D. Scareware
A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.
a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal
When a blend is created, a path is drawn between the starting and ending objects. This path is called what?
A. stroke B. backbone C. direction line D. spine