1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
15

__________ was the first operating system to integrate security as its core functions.

Computers and Technology
2 answers:
Mrrafil [7]3 years ago
7 0
Multics was the first operating system to integrate security as its core functions.
Umnica [9.8K]3 years ago
3 0

Answer:

Multics

Explanation:

The creation of the MULTICS operating system (MULtiplexed Information and Computing Service). This was a joint project carried out by the MIT (Massachusetts Institute of Technology), Bell Laboratories and General Electric. The idea was to distribute computer service to an entire city, in the same way that electricity is distributed using a machine with two processors and 256K 36-bit words (just over 1Mb) as support. MULTICS did not achieve its objectives, although it has been used in different organizations (especially universities). Yes, it is important to note that one of the Bell Laboratories scientists, Ken Thompson, rewrote a single-user version of MULTICS, which he sorely called UNICS.

You might be interested in
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Arisa [49]

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

4 0
3 years ago
Can someone help me on how to start this essay?
mezya [45]

Answer:

Start off with an interesting introduction (add questions) make it interesting.

6 0
3 years ago
Read 2 more answers
My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H
denpristay [2]

Answer:

hey! that happens to me too!

Explanation:

tbh i just think its whenever you comment on something and someone answers, that appears... but i could be wrong.

lol :)

4 0
3 years ago
Read 2 more answers
How does the actual amount left to spend differ from the budgeted amount for the remaining three months of the project
Studentka2010 [4]

Answer:

What is left at any instance of the project duration can be less than the budgeted sum? And if this is the situation then we need to calculate the over expense%, and which is:

oe%= ((Actual remaining *- Budgeted)/Budgeted)*100

And this gives us the amount by which the project is now lacking in the budget. However, project managers in the start itself assign some value for this, and hence this deficit does not create the problem at any time. And deficit occurs due to resources going down or falling ill. Or there can be an unwanted bug that requires more time.

Explanation:

Please check the answer.

3 0
4 years ago
Other questions:
  • How long does the Splunk search job remain active
    5·1 answer
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • Why do generated backup scripts usually include backticks around names such as database names and column names?
    5·1 answer
  • 897,100 rounded to the nearest hundred thousand is
    8·1 answer
  • To quickly jump to the last cell in a worksheet press ____.
    15·1 answer
  • Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE"
    5·2 answers
  • Does anyone know answers for reading plus level h and j
    13·2 answers
  • Martha is developing a software program in C++ and has a question about how to implement a particular feature. She performs an o
    13·1 answer
  • Will give brainliest!<br> Who created binary, and does anyone have any idea how?
    13·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!