1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
5

Are Microsoft an Apple more secure from malicious action because of their closed-source approach?

Computers and Technology
1 answer:
omeli [17]3 years ago
7 0

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

You might be interested in
If a while loop iterates forever,what is the most likely cause?
miv72 [106K]

Answer:

Runtime error probably. The program won't make it past the while loop in the code.

5 0
2 years ago
Which line in the following program will cause a compiler error?
Viktor [21]

Answer:

The answer is "Option A".

Explanation:  

  • In the given C++ Language program on line 8 compile-time error will occur, because in the code the conditional statement is used. In if block, we check two conditions together, which is the number variable value is greater than equal to 0 and check less than equal to 100.  
  • In this condition statement, a AND operator is used that execute when both condition is true, but in the last condition, we do not define a variable name that, checks value. That's why the program will give an error on line 8.
3 0
3 years ago
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. A
Lady_Fox [76]

Answer:

Implement a blacklist on the firewall and add the site the users are visiting.

Explanation:

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. The best solution to accomplish the request from the manager is to implement a blacklist on the firewall and add the site the users are visiting.

3 0
3 years ago
Define an interface GUIComponent consisting of four method declaration: open: void-returning, accepts no parameters close: both
Lesechka [4]

Answer:

interface GUIComponent{

  public void open();

  public boolean close();

  public void resize(int width, int height);

  public void move(int x, int y);

}

Explanation:

3 0
3 years ago
I need help 50 points and brainless if you answer
nata0808 [166]

Answer:

50

var X gets passed into the rectangle function, which I assume would set the x and y coordinates to what the var's have already been set to.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Assume the following representation for a floating point number 1 sign bit, 4 bits exponent, 3 bits for the significand, and a b
    9·1 answer
  • Which of the following describes an acceptable print resolution?
    7·1 answer
  • Hello I am currently working on a multi-sim project. In the file I have already created a timer that goes from 00 - 80 and reset
    11·1 answer
  • If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
    9·1 answer
  • The difference between a checked and an unchecked exception is:
    10·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • Which of the following statements best compares and contrasts hot and cold type?
    12·1 answer
  • Which of the following is true about binary search. A. It uses binary numbers in its algorithm B. It is slower than sequential s
    13·1 answer
  • Write a program that asks the user to enter a positive integer that represents a number in the decimal system and then displays
    12·1 answer
  • the ghost adventures team uses a variety of tools and technology in investigations. which one is described as an adjustable freq
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!