Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.

A. kernels
B. processes
C. forks
D. scanners

Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ________ is an action query that removes records from an existing table in the same database

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is commonly done as part of a vulnerability scan?

A. Exploiting misconfigured applications B. Cracking employee passwords C. Sending phishing emails to employees D. Identifying unpatched workstations

Computer Science & Information Technology