1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
5

Are Microsoft an Apple more secure from malicious action because of their closed-source approach?

Computers and Technology
1 answer:
omeli [17]3 years ago
7 0

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

You might be interested in
Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_v
miv72 [106K]
This is too much to understand what you need the answer too. In my opinion I can’t answer this question
5 0
4 years ago
Drag the tiles to the correct boxes to complete the pairs.
inessss [21]
<h2>Answer:</h2><h2>Releases a new video of its new high - tech manufacturing facility; To create a customer alert about a new program. </h2>

<h2>2)Hosts an online sweepstakes. .....;To increase brand loyalty </h2>

<h2>3)Gives bloggers.....:To give customers a peek into its operation.</h2>

<h2>4)Asks customers to determine their. .....;To allow customers to be part of the product development. </h2>

8 0
4 years ago
What does the opacity effect to do
azamat
Opacity is the condition of lacking transparency. Opacity is opaqueness.
3 0
4 years ago
Read 2 more answers
How does an agile team obtain clarity on backlog items that may be picked up in upcoming iterations?
kherson [118]
It is important for developers to know exactly what is expected from each use case on the backlog. To obtain clarity and understand all of the requirements, cross-functional teams including developers, testers, users of the system, management, etc. should work together. Actors in the system should be interviewed, observed, or be given a questionnaire to figure out details regarding specific requirements.
7 0
4 years ago
Read 2 more answers
Which of the four control methods is best suited for rapid response to an input or output event?
astraxan [27]

Answer:

1-Programmed I/O

Explanation:

The most appropriate way of doing it by using programmed I /O . This is because , the handler application as absolute control of sending data , and is synchronous in nature . All other I/O methods are asynchronous and the controlling / handler application has no idea about when the data transfer is going to complete .

7 0
4 years ago
Other questions:
  • How to calculate 100MB at 56 Kbps to transfer time?
    13·1 answer
  • What is the highest payed country
    9·1 answer
  • In order to practice as a lawyer specializing in digital media (or as a lawyer of any kind), you need to pass the state exam.
    5·1 answer
  • If you need to multiply 50 and 8 and divide by 2, what would you type on the numeric keypad
    6·1 answer
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • Write a Python program that asks the user for a positive, odd value. Once the value is validated determine if the number is Prim
    11·1 answer
  • What is an infodemic?
    10·1 answer
  • Write a c++ program which has array in fifteen element sort the array by selection the search for in element using binary search
    14·1 answer
  • Computer hardware refers to: Group of answer choices the mechanism through which users interact with a computer. handheld comput
    13·1 answer
  • What is virtual memory? What is the function of associative memory?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!