1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
2 years ago
9

Describe the differences and similarities between the most common operating systems used for Mac, PC, and Linux in

Computers and Technology
1 answer:
melamori03 [73]2 years ago
6 0

Answer:

well the difference is obviously the graphics cards, the fps they can run and many more, of course you can improve these by installing new operating systems compatiable for that system. you can also install graphic cards that dont necissarally go with that computer, another difference is how smoothly they can run certain programms and games.

Explanation:

You might be interested in
To add the word "confidential" to the background of a page, users would need to _____.
KengaRu [80]
I beleive you need to insert a watermark
3 0
3 years ago
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
Which of the following might be a job or task of an IT worker who manages networks?
Vladimir79 [104]
We need the options to be able to help.
7 0
4 years ago
Read 2 more answers
What does this program does?
tester [92]
Peoples from around the world help you answer the question you have.
4 0
4 years ago
The possibility of devices outliving a manufacturer, leaving them without long-term support against vulnerabilities is a possibl
Dafna11 [192]

Answer: Security (updating of software and hardware)

Explanation:

Internet of Things is one of the latest inventions in technology wherein smart objects and devices can connect to the internet and also share information within that space.

One of the several challenges of the Internet of Things is Security. Because of the introduction of the Internet, there is a vulnerability to hacking. Upgrades, therefore ought to be regularly provided so as to prevent hackers from recognizing patterns and hacking into them. So when the device outlives the manufacturer, there would be no one to provide regular updates thus making the device vulnerable.

8 0
4 years ago
Other questions:
  • What is a quick way to determine if a site might contain reliable information? looking at the title of the webpage reading the f
    5·2 answers
  • Select the correct text in the passage.
    5·1 answer
  • Which column and row references are updated when you copy the formula: =SUM($B5:D$15)?
    6·2 answers
  • (Java)
    12·1 answer
  • What do secondary sources rely on for their analysis of events?
    6·2 answers
  • .Choose the extention of Scratch Project<br><br><br> .sb2<br><br> jpeg<br><br> .exls
    5·2 answers
  • Identify the type of error described
    6·1 answer
  • Please help me asapppp!​
    8·2 answers
  • 1. provides a list of at least five SSIDs and the
    15·1 answer
  • Write an application that allows a user to enter a filename and an integer representing a file position. Assume that the file is
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!