1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
5

Are Microsoft an Apple more secure from malicious action because of their closed-source approach?

Computers and Technology
1 answer:
omeli [17]3 years ago
7 0

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

You might be interested in
Which of the following is the correct binary representation of the number 2?
dusya [7]

Answer:

10

Explanation:

To convert decimal to binary, you just count like normal, but instead of regrouping when adding 1 when you reach 9, you regroup when you reach 1.

in this case, you would count like this:

0

1

10

7 0
3 years ago
In the writing process, after you ve narrowed down your topic, you can use the _______ technique to view a topic from different
Veseljchak [2.6K]
It's a. when you finish your topic you can see topic from <span>different perspectives by questioning. Matching will not allow you that.</span>
8 0
3 years ago
Read 2 more answers
What is the difference between posting and transfer in ICT please I need the answer before TMR​
Radda [10]

Answer: b

Explanation: trust

7 0
2 years ago
Show me how to create an argument essayshow me how to create an argument essay ​
Lady_Fox [76]

Answer:

1 Introduce the problem.

2 Explain your perspective.

3 Explain your opponent's perspective. Refute their points one-by-one as you go.

4 Present your evidence.

5 Conclude your argument.

1 Introduce the problem.

2 Explain your opponent's perspective first. ...

3 Explain your perspective.

Explanation:

3 0
2 years ago
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • Test if a password entered is correct. The secret phrase is Ada Lovelace. Sample Run 1 Enter the Password: Ada Lovelace Sample O
    13·1 answer
  • How do rubrics increase learning?
    15·2 answers
  • C programming question:
    12·1 answer
  • What is the full word of"VPN"?​
    15·2 answers
  • Why is the answer B?
    6·1 answer
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • What are search tries? Why are they more efficient than usualsearching<br><br> algorithms?
    8·1 answer
  • What can help an interface user understand or navigate an online interface?​
    15·1 answer
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!