1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
15

__________ was the first operating system to integrate security as its core functions.

Computers and Technology
2 answers:
Mrrafil [7]3 years ago
7 0
Multics was the first operating system to integrate security as its core functions.
Umnica [9.8K]3 years ago
3 0

Answer:

Multics

Explanation:

The creation of the MULTICS operating system (MULtiplexed Information and Computing Service). This was a joint project carried out by the MIT (Massachusetts Institute of Technology), Bell Laboratories and General Electric. The idea was to distribute computer service to an entire city, in the same way that electricity is distributed using a machine with two processors and 256K 36-bit words (just over 1Mb) as support. MULTICS did not achieve its objectives, although it has been used in different organizations (especially universities). Yes, it is important to note that one of the Bell Laboratories scientists, Ken Thompson, rewrote a single-user version of MULTICS, which he sorely called UNICS.

You might be interested in
Which extension is appropriate for Word document templates?
Ronch [10]

Answer:

<em><u>DOCX pretty sure</u></em>

<em><u /></em>

<em><u>hope that this helps :)</u></em>

<em></em>

5 0
3 years ago
Read 2 more answers
What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag
Burka [1]

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

8 0
3 years ago
Read 2 more answers
Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
Sveta_85 [38]

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question attachment file is missing so, following the code to this question:

using function IF:

=IF(Logical test, how to do it when testing is right, how to do it when testing is wrong)

In this scenario, a leader development Worker should pass 2 tests

In the First test may not finish his training

If yes-" satisfied"  

It is not true, it will go to 2nd test  

In the second test, If employee served a service period of even more than 1 year (to be performed in a first check if not correct)

If, It is yes=" yes"  else  not ="No"  

= IF(Leader Training = Yes, "Completed," IF(Service time> 1," Yes ","No")  

That's means,  

The sort IF(I2 = "Yes","Completed"),IF(D2>1," Yes","No") must be used in cell M2)

Copy Cell M2 Then the selected M3 over M30

8 0
3 years ago
Hello people, I was wandering if I could get some people to complete this questionnaire for my business course. It would be very
madam [21]
What do I have to do
3 0
3 years ago
Compare the current in two lightbulbs wired in a series circuit
julia-pushkina [17]
<span>The current flow in two light bulbs wired in a series circuit is identica</span>
7 0
3 years ago
Other questions:
  • Anna wants to open the Run dialog box to run her program file. Which keys should she press to open the Run dialog box?
    14·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • ____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the n
    11·1 answer
  • What is logical memory?
    15·1 answer
  • ________models software in terms similar to those that people use to describe real- world objects.
    6·1 answer
  • With _________, users will receive recommendations for items liked by similar users.
    9·1 answer
  • Match each example to the type of component, either Input, Process, or Output.
    12·1 answer
  • Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the w
    7·1 answer
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!