1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
4 years ago
13

What are the risks of logging into a system routing as “root” or some other administrative identity?

Computers and Technology
1 answer:
Elena L [17]4 years ago
5 0
"Root" in Linus is the the same as Administrator in Windows.
When you log into a system with identity "root" this means that you have administrative privileges (you are not simple user of the system and application). The risk is that as a "Root" you have the authority to make changes in the system and maybe harm the system if you don't know exactly what you are doing.
You might be interested in
A set of programs that enable the hardware to process data is
Travka [436]
I think the answer youre looking for would be software. i hope this helped :3
6 0
3 years ago
_ is the adherence to a personal code of principles.
trapecia [35]

Answer: Ethics

Explanation:

 Ethics is the basic principle for the personal code. The code of the ethics is basically designed for outline the values in the organization with honesty and integrity.

The ethics is basically depend upon the principle of core value of the organization. The code of the ethics basically guide the core value in the organization and breaking the rule of ethics can also cause termination from the organization.

Morality, integrity and honesty are all the sub part of the ethics vale in the organization. Therefore, ethics is the correct option.  

3 0
4 years ago
What is abacus main purpose in early days?​
stiv31 [10]
To help count large numbers
7 0
3 years ago
Which group allows you to add notes to your presentation? Animations Presentation views Show Zoom
mel-nik [20]

Answer:

View

Explanation:

With "View", you have the option to add comment(s) which may be important even after the presentation is completed.

Cheera

6 0
3 years ago
There are three types of operators in BASIC-256 <br>a) True b) False​
Anestetic [448]

Answer:

a)True is the answer......

6 0
3 years ago
Other questions:
  • ________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility
    15·1 answer
  • ____ technologies support digital transmission for both voice and data
    12·1 answer
  • Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
    5·1 answer
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • 1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative va
    11·1 answer
  • In your own words, describe invention.
    8·2 answers
  • Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563
    5·1 answer
  • What are some positive impacts technology has on the environment?​
    5·2 answers
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
  • If the bookstore sold 8 books for $66 at that rate how much was one book
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!