This type of software works with end users, application software, and computer hardware to handle the majority of technical details.

A. communications
B. utility
C. application
D. system


Answer: D

Computer Science & Information Technology

You might also like to view...

Under a random page replacement strategy, ________.

a) each page in main memory has a unique likelihood of being selected for replacement b) there is generally a small probability that the page that is replaced will be referenced soon c) the system is consistently likely to achieve high performance d) all of the above

Computer Science & Information Technology

Which access control attack is also referred to as masquerading?

A. emanating B. sniffing C. malicious software D. spoofing

Computer Science & Information Technology

____ colors are colors that are pleasing to look at, create a sense of balance, and stimulate a viewer to explore a composition.

a. Harmonious b. Even c. Technical d. Uncompressed

Computer Science & Information Technology

The owner of a file or folder may deny Administrators access to a resource. But an administrator can exercise the optional right to take ________of any resource to gain access to it

Fill in the blank(s) with correct word

Computer Science & Information Technology