1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
3 years ago
8

What is UNIX? A program for writing documents Graphical interface Internet browser Operating system

Computers and Technology
2 answers:
nataly862011 [7]3 years ago
7 0
Hi!

Unix is an <em>operating system.

</em>Hopefully, this helps! =)<em>
</em>
kipiarov [429]3 years ago
3 0

The correct answer is D. Operating System

Explanation:

In technology, an operating system is responsible for most of the functions of a technological device as this manages the resources of the device and allows users to access them. Some of the most famous operating systems include Microsoft Windows and macOS although there are alternative operating systems such as Linux or UNIX. In the case of UNIX, this operating system is used mainly for computers and it uses a modular design that implies the system is divided into different sections or modules. According to this, UNIX is an operating system.

You might be interested in
Which devices are managed through device management?
Ratling [72]
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
7 0
2 years ago
the two main forces acting on a computer that sits on a table are _________ and _________. a. weight; gravity b. weight; mass c.
EleoNora [17]
It is A.weight: gravity
8 0
3 years ago
Read 2 more answers
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
storchak [24]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

3 0
3 years ago
The two rules within Title II of hippa that have the greatest relevance and impact on the business associates are
Ne4ueva [31]
The two rules within Title II of HIPPA (Health Insurance Portability and Accountability Act) that has great relevance and impact on the business associates are: 

1. Privacy Rule - stating of child welfare agencies
2. Security Rule - complying of HIPPA requirements
5 0
3 years ago
Read 2 more answers
Write the SQL commands to obtain the following information from the system catalog:
netineya [11]

The SQL commands to obtain the information from the system catalog is illustrated below.

<h3>How to illustrate the the SQL commands?</h3>

It should be noted that SQL commands are instructions to communicate with a database to perform a task.

List every table that you created. - SHOW TABLES

List every field in the Client table and its associated data type. - SHOW COLUMNS FROM CUSTOMER

List every table that contains a field named TaskID. - SELECT TBNAME FROM SYSCOLUMNS WHERE COLNAME = 'TaskID'

Learn more about SQL on:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
Other questions:
  • Question 9/10
    14·2 answers
  • Test Average and Grade
    12·1 answer
  • "Consider yourself driving with 60 miles/hour in a city that has only grid like streets, and your GPS is broken.The specificatio
    12·1 answer
  • The smallest building block of a wireless lan is a ______.
    5·1 answer
  • This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
    7·1 answer
  • Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation.
    7·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • Document templates are available online.<br> True<br> False
    8·2 answers
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • Valerie regularly generates sales reports from her organization's data warehouse. She uses these reports to create presentations
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!