The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor's attention.
1). CPU
2). slice of time
3). stack
4). event
1. The potential impact of a threat on a system is called as its ______________.
3. The______. folder retains copies of messages that you have started but are not yet ready to send.
4. The contents of__________are lost when the computer turns off.
7. What happens when we try to delete the files on the floppy ?