1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
1 year ago
10

ABC company have lots of computer running window 7. But they are not thinking to upgrade a higher version of window. One of the

staff suggested to install CHROME OS Flex and use android app for different purposes. Please state and explain 3 kinds of threats for the above suggestions
Computers and Technology
1 answer:
Alexxx [7]1 year ago
5 0

First threat

  • It's malware
  • Because chrome OS is not much secure as compare to windows 11 (Prime opponent)

2nd threat

  • It's speed
  • Chrome OS is litreally very slow .
  • On comparing to windows edition it lacks in multiple factor so you work per unit tike decreases

Third threat

  • You may be able to use Android apps but windows is made for Computers
  • In several factors like ads,cleanness chrome OS will create problems
You might be interested in
Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
schepotkina [342]

Answer:

Explanation:

The program in question would create a new Scanner Object which asks the user for the Username first. It would then save this input into a temporary variable and compare it to the actual username in the database. Since the username is not case sensitive, we would use the toLowerCase() method on both the input and the database username so that they match even if the letters are not the same case structure. If both usernames match then we would move on to ask the user for the Password and compare it with the database password for that user. Since this one is case sensitive we would compare as is. Finally, if both Username and Password match we would print "Hello World" otherwise we would print "Login Failed."

3 0
2 years ago
Can someone please help me I need to turn this in my 3:00pm Eastern time
galben [10]

Answer:

1000000000

Explanation:

8 0
2 years ago
What is the definition of bug?​
salantis [7]
In what way is it used?
3 0
3 years ago
sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
natta225 [31]

Hello,

Well my advice for Sara when using the web would be 3 things.

1: Never tell anyone where you live,Your name, Or any other personal information.

This is important as it will keep you safe and others that are in your family.

2: Get anti virus hardware on your devise.

This will help to stop bad people, and bugs/glitches,this will also protect you from information thieves.

3: Make sure to keep your passwords saved on paper.

I know a lot of people use, google(ect.) to save there passwords to make everything easy, but a good way to never loss them is to wright them down.

Have a great day!



7 0
3 years ago
What type of software is developed by volunteers, contains code in the public domain, and helped to make Linux popular
valentina_108 [34]
Perhaps I’m being 5tup1d but I think your describing open source soft in general. Linux and a lot of periphery that runs on Linux is open source so it did play a large role being that it’s not proprietary like Windows and windows adjacent soft.
5 0
2 years ago
Other questions:
  • How can development in ICT be utilized to speed up the development and integration efforts
    15·1 answer
  • Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified len
    14·1 answer
  • What are finger nails made of?-
    12·2 answers
  • The order of precedence is very important when building formulas in Excel. Which of the following formulas will produce 778 as t
    11·1 answer
  • What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa
    8·1 answer
  • A string with delimiters can be parsed into separate fields using the _____ class.
    8·1 answer
  • The first numerical control machine tool was demonstrated in 1952 in the United States at the Massachusetts Institute of Technol
    14·1 answer
  • Which of the following was the primary purpose of muckraking, sensationalism, and yellow journalism in the early 1900s?
    11·1 answer
  • Which one way in which using infrared in game console controllers could affect the experience of a person playing the game?
    8·1 answer
  • Identify and explain five areas where computers are used to process <br> data
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!