This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
A. communications
B. utility
C. application
D. system
Answer: D
You might also like to view...
Under a random page replacement strategy, ________.
a) each page in main memory has a unique likelihood of being selected for replacement b) there is generally a small probability that the page that is replaced will be referenced soon c) the system is consistently likely to achieve high performance d) all of the above
Which access control attack is also referred to as masquerading?
A. emanating B. sniffing C. malicious software D. spoofing
____ colors are colors that are pleasing to look at, create a sense of balance, and stimulate a viewer to explore a composition.
a. Harmonious b. Even c. Technical d. Uncompressed
The owner of a file or folder may deny Administrators access to a resource. But an administrator can exercise the optional right to take ________of any resource to gain access to it
Fill in the blank(s) with correct word