1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
5

Are Microsoft an Apple more secure from malicious action because of their closed-source approach?

Computers and Technology
1 answer:
omeli [17]3 years ago
7 0

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

You might be interested in
If a surface is. it is exactly vertical
Jobisdone [24]
What are the choices
8 0
3 years ago
How to be like Elon Musk who achieved more in his 46 years than we will ever achieve in ten lifetimes?
kvasek [131]

Answer:

You can just be yourself?

4 0
3 years ago
Everybody at a company is assigned a unique 9 digit ID. How many unique IDs exist?
Brut [27]
If you include all zeroes, then it should be 1,000,000,000. Otherwise it’s 999,999,999.

Think of how between 0-9 theres 10 numbers, and use that logic towards 000000000-999999999
3 0
3 years ago
A personal computer uses a number of chips mounted on a circuit board called microprocessor. system board. daughter board. mothe
AveGali [126]
I am almost 100% sure that it is called a microprocessor 
8 0
3 years ago
Your manager asks you to calculate the sale price if the product is marked down 20 percent. You enter the original price in cell
padilas [110]
The answer is =A2*.80
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the last step in conducting url search
    11·1 answer
  • What is RAM? explain it
    9·2 answers
  • Blank text has a darker apperance than normal texts
    8·1 answer
  • If you delete a sent message on gmail does the person still get it
    14·1 answer
  • Write code that uses the input string stream inSS to read input data from string userInput, and updates variables userMonth, use
    8·1 answer
  • The architecture in which the database resides on a back-end machine and users access data through their workstations is
    5·2 answers
  • What number system do people in America use?
    10·2 answers
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • What is the best way to improve an online search?
    11·2 answers
  • St. CHarles school's music community is organizing a fundraiser. They want to create a simple but attractive website. However, t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!