1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
5

Are Microsoft an Apple more secure from malicious action because of their closed-source approach?

Computers and Technology
1 answer:
omeli [17]3 years ago
7 0

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

You might be interested in
Sarah has an audio file to insert into a presentation, but she does not want the entire file to play. What should she do to have
Sonja [21]

Answer:

3. Use the Trim Audio dialog box. :3

3 0
2 years ago
Read 2 more answers
If the floating-point number representation on a certain system has a sign bit, a 3-bit exponent, and a 4-bit significand. What
vekshin1

Answer:

Normalization of storage is a typical method of storing the floating point number by shifting the decimal after the first figure of the number such as 1101.101 is normalized to 1.101101x23.

If the number that is in hovering point representation has 1 sign bit, 3-bit exponent with a 4-bit significant:

whenever the storage is normalized, then the biggest positive floating spot number in 2`s and the complement notation is 0.11112 x 23 = 111.12 =7.5

If the storage is returned to normal, then the minimum positive floating point number is 0.12 x 2-4 =0.000012 =1/32 = 0.03125.

Explanation:

Whenever the floating figure is keyed into the computer memory, then the first bit will be the sign bit, the next 8 bits are for exponent and 23 bits are used for storing significand. The array of exponents is from -127 to 128. While Exponent 127 stands for 0 and positive figures can be represented by values bigger than 127. The biggest floating point number will be represented as 0.111111.... 1111x 211111111

7 0
3 years ago
You must configure an ip address on a catalyst 2950 xl switch using the default management switch port. from global configuratio
BlackZzzverrR [31]
Int vlan 1ip address 192.168.10.2 255.255.255.0
Is the command that definitely would you enter to configure the correct management port. So we must configure the IP address on a catalyst 2950xl switch using the default management switch port from the global configuration mode. The answer in this question is int vlan 1ip address 192.168.10.2 255.255.255.0 

7 0
3 years ago
Panarchy considers the big picture because, in reality, smaller systems are embedded inside of larger systems and they influence
SVEN [57.7K]

Answer:

The connection will be represented by the pair of "Revolt" and "Remember".

Explanation:

  • In a nested structure, the panarchy system links the evolutionary periods. Several connections may have occurred between levels at one point of the engineered process and stages at another.The tags ' revolt ' and ' remember ' are two major connections.
  • Invent, explore, and check the smaller, quicker, clustered levels, while the bigger, slower rates preserve and maintain stored system dynamic allocation.
  • The slower and larger levels, therefore, set conditions under which quicker and smaller ones work.

Therefore, it's the right answer.

4 0
3 years ago
Instructions
marta [7]

Answer:

Explanation:

5 0
3 years ago
Other questions:
  • A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has be
    6·1 answer
  • The operating system is loaded into memory during the ____ process
    6·1 answer
  • State three differences between a hard drive and a pen drive​
    6·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • How do you determine latitude using an astrolabe?
    11·1 answer
  • How much electricity is in the human brain? ​
    8·2 answers
  • Given the following MIPS Code Fragment:
    14·1 answer
  • The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
    10·1 answer
  • Which of the following statements is true regarding a user account? Once a user account has been created, it cannot be completel
    8·1 answer
  • Retype the below code. Fix the indentation as necessary to make the program work.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!