1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
15

__________ was the first operating system to integrate security as its core functions.

Computers and Technology
2 answers:
Mrrafil [7]3 years ago
7 0
Multics was the first operating system to integrate security as its core functions.
Umnica [9.8K]3 years ago
3 0

Answer:

Multics

Explanation:

The creation of the MULTICS operating system (MULtiplexed Information and Computing Service). This was a joint project carried out by the MIT (Massachusetts Institute of Technology), Bell Laboratories and General Electric. The idea was to distribute computer service to an entire city, in the same way that electricity is distributed using a machine with two processors and 256K 36-bit words (just over 1Mb) as support. MULTICS did not achieve its objectives, although it has been used in different organizations (especially universities). Yes, it is important to note that one of the Bell Laboratories scientists, Ken Thompson, rewrote a single-user version of MULTICS, which he sorely called UNICS.

You might be interested in
Universal containers has two teams: Sales and Services. Both teams interact with the same records. Sales users use ten fields on
Oxana [17]

Answer:

Two profiles, one record type, two page layouts.

Explanation:

Record types and functions allow you to present forward different business processes, pick-list values, as well as page layouts to diverse range of users based on their profiles.

Going by the question, we can conclude that the minimum necessary configuration in order to meet the requirement in the question above are:Two profiles, one record type, two page layouts.

6 0
3 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
Instant messaging is commonly referred to as
melomori [17]
Chat, IM, in real-time
7 0
4 years ago
The program requires the age to be between 0 and 8.
yaroslaw [1]

Answer:

b

Explanation:

5 0
3 years ago
Write a program that will prompt the user to enter an integer. The program should square the number and then print the squared n
Kay [80]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// function to compute sum and product

void square(int input)

{

   // variable to store the square of number

   long long squ_num;

   calculate the square of number

   squ_num=pow(input,2);

   // print the output

   cout<<"square of "<< input<<" is: "<<squ_num<<endl;

   

}

// driver function

int main()

{

   int n;

   // read the number until user enter 0

   do{

       cout<<"enter a number!! (0 to stop):";

     // read the input from user

       cin>>n;

       // call the function to calculate square of input number

       square(n);

       

   }while(n!=0);

 

return 0;

}

Explanation:

Declare a variable "n" to read the input number from user.Call the function  square() with parameter "n".In this function, it will calculate the square  of the input number and print it.This will repeat until user enter 0 as  input.Program will ends when user give 0 as input.

Output:

enter a number!! (0 to stop):5                                                                                                                                

square of 5 is: 25                                                                                                                                            

enter a number!! (0 to stop):7                                                                                                                                

square of 7 is: 49                                                                                                                                            

enter a number!! (0 to stop):11                                                                                                                              

square of 11 is: 121                                                                                                                                          

enter a number!! (0 to stop):0

3 0
4 years ago
Other questions:
  • If you want to conserve ink or toner, you can instruct PowerPoint to print ____ documents.
    10·1 answer
  • WILL GIVE BRANLYIST
    6·1 answer
  • Which image property helps to create distinction between the highlights and shadows of an object?
    14·2 answers
  • "The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
    11·1 answer
  • Why operating system is pivotal in teaching and learning
    10·1 answer
  • Yo who do u add a pic on here
    13·1 answer
  • Moving your Sprite top to bottom is moving along the X coordinate?
    5·1 answer
  • Davingould1115...................answer 3​
    11·1 answer
  • How does social network use message to entertain?
    14·1 answer
  • Why does this happen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!