1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
5

A system administrator is selecting an operating system for use by the company’s research and development team. The team require

s an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?
A. Windows 10 Enterprise
B. Mac OS X
C. Linux
D. Windows 7 Professional
Computers and Technology
1 answer:
tekilochka [14]3 years ago
5 0

Answer:

Linux

Explanation:

Linux is the open source operating system that can be modified at any time as per requirement of the client or user.

You might be interested in
The internet is best described as a vast
Burka [1]
The internet is best described as a vast waterfall of information.
4 0
3 years ago
Read 2 more answers
Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
ella [17]

Answer:

DMZ-based.

Explanation:

VPN or virtual private network, as the name implies, is a network virtually extending a private network over a public network or the internet, to provide secure access to users that can not physical access the actual private network.

Delimitarized zone DMZ is an isolated point between an internal or private network and the internet, configured to provide access to untrusted or unauthorized users. The DMZ- based VPN is a virtual private network with two firewalls securing the internet and private network end, but provides access to users.

3 0
3 years ago
What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over
lana [24]

18-25 are the most growth in social media

6 0
3 years ago
A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned,
BaLLatris [955]

Answer:

The answer is read only permission

Explanation:

The effective permission for the user is the read only permission.

8 0
3 years ago
Olivia started working last year. By April 15th, she will need to prepare and send the Federal government _____.
omeli [17]
Income tax documents
5 0
3 years ago
Read 2 more answers
Other questions:
  • identify three of the many shared ethical standards among businesses that are incorporated in codes of ethics
    6·2 answers
  • Please label the parts its urgent Best answer receives a brainliest and 20 points please i need it :) :) ​
    5·2 answers
  • Eugenia told her coach that she was too tired to play. As soon as she said it, she realized that she had made a big mistake. She
    12·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • To all paladins players out there!!!!!
    14·1 answer
  • How do u reverse image search on Android? ​
    9·1 answer
  • Which of the following best describes the protocol used on the internet?
    8·1 answer
  • What is an example of an attribute for a screen object
    14·1 answer
  • The base on which the number n=(34)? is written if it has a value of n= (22)10​
    6·1 answer
  • Int r=6;<br> int v=20;<br> System.out.println( r % v );
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!