1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
5

Which of the following statements about Linux is not​ true? A. Linux works on all the major hardware platforms. B. It plays a ma

jor role in the back office running local area networks. C. It is available in free versions downloadable from the Internet. D. Linux applications are embedded in cell​ phones, smartphones,​ netbooks, and other handheld devices. E. It has garnered 20 percent of the server operating system market.
Computers and Technology
1 answer:
mel-nik [20]3 years ago
4 0

Answer:

Option E.

It has garnered 20 percent of the server operating system market.

Explanation:

Linus despite being a powerful operating system has not yet been able to garner 20 percent of the server operating system market. That area is still dominated by the Microsoft server, which has a majority of the market shares.

Windows server has about 73% market shares while Linux, Unix and other servers share the remaining percentage. This leaves Linux with about 13% of the server operating system market share.

You might be interested in
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Pda bkhhksejc pnwjoynelp dwo xaaj ajykzaz ywj ukq zaykza ep???<br><br><br> The Key Value is 22
Sindrei [870]

Answer:

The following transcript has been encoded can you decode it???

Explanation:

It is a ceasar cipher. Shift every letter in the alphabet by 22 positions.

3 0
3 years ago
When you gather primary or secondary data, what part of the market information management process are you participating in?
Umnica [9.8K]

Answer:

Heyyyooo!

The answer is market research.

Hope this helps!

Explanation:

Market research is the way toward gathering, analyzing and interpreting data about a market, about an item or administration to be offered available to be purchased in that advertise, and about the past, present and potential clients for the item or administration; examination into the attributes, ways of managing money, area and necessities of your business' objective market, the industry all in all, and the specific contenders you confront.  

3 0
3 years ago
Do you believe that oop should be phased out and we should start working on some alternative?
Ksju [112]
I don’t think we should because we all have our one choices that we should achieved and we should show
5 0
3 years ago
How to transfer photos from iphone to iphone?
STALIN [3.7K]
If you have icloud then you can transfer them.
7 0
3 years ago
Read 2 more answers
Other questions:
  • you install teamviewer on your workstation at home so that you can ac ess it when on the road. how can you be assured that unkno
    9·1 answer
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • he fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in th
    7·1 answer
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • A local reaction will occur at the site of the exposure, such as irritations or damage to the skin, eyes or lungs true or flase
    14·1 answer
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • Define critical thinking, and list the mental activities involved in critical thinking.
    8·2 answers
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • What are some positive and nevative aspects of technology?
    11·1 answer
  • Simple Java programming
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!