1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
4 years ago
15

Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus the

ir operating systems are referred to as which of the following? a.multiuser b.single user c.single processing d.multiprocessing
Computers and Technology
1 answer:
Natali5045456 [20]4 years ago
4 0

Answer:

a. multiuser

Explanation:

Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time and thus their operating systems are referred to as multiuser.

Examples of multiuser operating systems are Unix, Mac OS, Ubuntu, Linux, Windows 2000 etc.

You might be interested in
Sally notices that she has the same set of 10 blocks in her code in multiple places. She decides to create a new block (procedur
SashulF [63]

Answer: it is C. 41

Explanation: i no it

6 0
3 years ago
Given a variable, polygon_sides, that is associated with a dictionary that maps names of polygons to number of sides, create a n
sveticcg [70]

Answer:

polygon_sides = {"Triangle" : 3,"Square" : 5}

n_polygons = {}

for key in polygon_sides:

   n_polygons[polygon_sides[key]] = key

print("Polygon sides: ", polygon_sides)

print("Names of polygons: ", n_polygons)

Explanation:

  • Initialize the polygon_sides dictionary.
  • Loop through polygon_sides dictionary and assign the associated names to n_polygons variable.
  • Display the polygon sides and the names of polygons.
3 0
3 years ago
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
What are two specific Netstumbler features that are related to cybersecurity? Name one feature that is related to improving cybe
NikAS [45]

The feature that can improve cybersecurity is the detection of interferences, and the one that can be used by hackers is checking the configuration of networks.

Netstumbler is a program used to identify surround wireless networks. This program is mainly available for Window systems and includes the following features:

  • Detecting wireless networks.
  • Detecting interferences.
  • Checking the configuration of networks.

These features have both a positive and a negative side as they can be used to increase cybersecurity, which is positive, but they can also be used by hackers to attack networks and the devices in them.

One positive feature is the detection of interferences because this can be used to detect possible external or threatening networks. On the other hand, checking the configuration can be a negative feature because hackers can use this information to enter and hack the networks.

Learn more in:  brainly.com/question/17021829

4 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
Other questions:
  • Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
    11·1 answer
  • (Financial application: compound value) Suppose you save $100 each month into savings account with an annual interest rate of 5%
    6·1 answer
  • To support an internet client, you must have six elements. the first three -- a computer, an operating system and tcp/ip -- are
    7·1 answer
  • Bugs bunny personality traits
    7·1 answer
  • A bakery sells three types of muffins whose prices are as follows: 1- blueberry muffin, $2.98 2- chocolate chip muffin, $4.50 an
    6·1 answer
  • A ____ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet)
    14·1 answer
  • 20.
    15·2 answers
  • What are personal skills?
    5·1 answer
  • is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions
    7·1 answer
  • It is a part of webpage that contains the logo ang branding of the web page​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!