1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
15

Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?

Computers and Technology
2 answers:
Xelga [282]3 years ago
6 0

Put a code or security system on or a very secure password

Hope this helps...

ahrayia [7]3 years ago
3 0

Answer:

OS Login feature

Explanation:

In operating system such as Windows, Mac OS and Linux, there is always an OS Login feature that prevent unknown or unauthorized users from accessing the system. The OS Login feature will require users to input their username and password to authenticate their identity before they can access the system.

In a more advanced level, the OS Login can also request fingerprint or face recognition for identity authentication.

You might be interested in
An author’s qualifications are important in determining whether a media source is...
geniusboy [140]

Answer:

An author's qualifications are important in determining whether a media source is;

Credible

Explanation:

In order to find out about the credibility of an author, the preface, forward, and or introduction including the book's back cover should be checked for the author's credentials, qualifications and areas where the author is an expert

The author's credential can also be checked by finding out about other books the author has written and also about the author's biography.

4 0
3 years ago
**PLEASE AN IPO CHART AND A C++ PROGRAM FOR EACH QUESTION**
Yuki888 [10]

answer is b

rtyujhygtrcdxrtgyhgtfr

7 0
2 years ago
There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
GarryVolchara [31]

The potential risks that is linked with the use of internet as a resource point is known to be copyright infringement.

<h3>What is Copyright infringement?</h3>

This is known to be the creation of a book or any other resource material that has been copyrighted and protected without taking the granted permission of the copyright holder who is found to be the author of the work.

Note that The potential risks that is linked with the use of internet  resource point is known to be copyright infringement and one can be punish for it.

Learn more about copyright infringement from

brainly.com/question/14855154

#SPJ4

6 0
2 years ago
Using the =na() function in a cell, makes it clear that data is not _______ and hasn't been ______ accidentally.
inysia [295]
Show the cost to rent different items
5 0
3 years ago
Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based
Amanda [17]

Answer:

Infrastructure as a service(Iaas)

Explanation:

Infrastructure as a service(Iaas) is used to provide hardware,storage,servers and datacenter space or network components

4 0
3 years ago
Other questions:
  • What is the term of social media
    14·1 answer
  • "omr, ocr, and micr are all types of ________."
    7·2 answers
  • __________ is a website that offers a variety of Internet services from a single, convenient location.
    13·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • How to simplify???? 2(-3x^2+6x+1)-2(4x^2-3x+1)<br><br>​
    7·1 answer
  • Given the function F (X, Y , Z)=Σm(0,1, 2 , 4 , 6)
    13·1 answer
  • In which of these areas can software engineers specialize?
    10·1 answer
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!