1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
2 years ago
10

ABC company have lots of computer running window 7. But they are not thinking to upgrade a higher version of window. One of the

staff suggested to install CHROME OS Flex and use android app for different purposes. Please state and explain 3 kinds of threats for the above suggestions
Computers and Technology
1 answer:
Alexxx [7]2 years ago
5 0

First threat

  • It's malware
  • Because chrome OS is not much secure as compare to windows 11 (Prime opponent)

2nd threat

  • It's speed
  • Chrome OS is litreally very slow .
  • On comparing to windows edition it lacks in multiple factor so you work per unit tike decreases

Third threat

  • You may be able to use Android apps but windows is made for Computers
  • In several factors like ads,cleanness chrome OS will create problems
You might be interested in
You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
liq [111]

Answer:

Tunneling

Explanation:

A networking protocol that is used to send data from one network to another network by encapsulation process.

It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.

8 0
3 years ago
20 points!!
creativ13 [48]
I think it’s C considering what clip art is, you put in pictures. i’m crying with you
3 0
2 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Westkost [7]

Answer:

The ping command.

Explanation:

In a network, workstations known as clients, users or nodes are the devices where data is needed or sents from. A server on the other hand, is a device in the network, configured to render a particular service like database, domain name service, web service etc.

When a link from a workstation to a server is down, the workstation looses connection the server. To confirm the connectivity of the link, "ping" the server ip address from the workstation using the command "ping 'server ip address'". This sends echo packets to the server, which is echoed back if there is connectivity.

6 0
3 years ago
The home row is where________.
Sever21 [200]

Answer:

on the keyboard

Explanation:

where the caps locks at on that row or the middle row where A starts

top row q

home row a

low row z

8 0
3 years ago
In Python 3, write a decorator function that has the following property:
kicyunya [14]

Answer:

Python code is explained below

Explanation:

# decorator.py starts

def uppercase(fcn):

def wrapper():

original = fcn;

modified = str(fcn).upper() ;

return modified;

return wrapper();

# decorator.py ends

# greet.py starts

import decorator  #to generate the decorator

def greetings():  #invokes the greetings function for output

print("Hello");

print(decorator.uppercase(greetings));

# greet.py ends

8 0
3 years ago
Other questions:
  • a circuit has an inductor with an inductive reactance of 230 ohms. this inductor is in series with a 500 ohm resistor. if the so
    5·1 answer
  • The protocol that enables computers on the Internet to communicate with each other is called _____.
    7·1 answer
  • What is a segment
    12·1 answer
  • Which of the following terms describes surgery through a small incision in the abdomen?
    11·1 answer
  • Anna’s computer will not power on. What aspect of the computer should Anna check (hardware or software)? How can Anna work to re
    5·1 answer
  • After spending a year in India, Giovanna returns home to the United States and is inspired to raise money to help her new friend
    14·1 answer
  • Suppose for the worst case, given input size n: Algorithm 1 performs f(n) = n2 + n/2 steps Algorithm 2 performs f(n) = 12n + 500
    6·1 answer
  • What: A challenging question on this module's material.
    14·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • create your own min function that finds the minimum element in a list and use it in a separate function
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!