1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
15

Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?

Computers and Technology
2 answers:
Xelga [282]3 years ago
6 0

Put a code or security system on or a very secure password

Hope this helps...

ahrayia [7]3 years ago
3 0

Answer:

OS Login feature

Explanation:

In operating system such as Windows, Mac OS and Linux, there is always an OS Login feature that prevent unknown or unauthorized users from accessing the system. The OS Login feature will require users to input their username and password to authenticate their identity before they can access the system.

In a more advanced level, the OS Login can also request fingerprint or face recognition for identity authentication.

You might be interested in
What is software piracy?
Semmy [17]

Answer:

B

Explanation:

stealing someone else's private data

5 0
3 years ago
FS and GS are two___________________ in protected mode.
masha68 [24]

Answer:

Segment registers

Explanation:

The initial purpose behind the segment registers was to enable a program to access many distinct (big) memory sections designed to be autonomous and part of a constant virtual store.

They don't have a processor-defined objective, but instead Operating system runs them for purpose. The GS register is used in Windows 64-bit to point to constructions defined by the operating scheme.   Operating system kernels usually use FS and GS to access thread-specific memory. In windows, thread-specific memory is managed using the GS register. To access cpu-specific memory, the linux kernel utilizes GS.

7 0
3 years ago
Star and peer-to-peer are types of
Naily [24]
Networks? i’m not sure, but i know peer-to-peer is a type of network. i’m not sure about lending though
3 0
2 years ago
Read 2 more answers
You can use pen and highlighter tools to emphasize information on a slide during a PowerPoint presentation. These tools are avai
Savatey [412]
ANSWER:
C. Slide Show toolbar
5 0
3 years ago
The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
max2010maxim [7]
It is eather pythone or html
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is a strictly layered pattern, provide an example of its usage.
    13·1 answer
  • A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibili
    5·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • What is a characteristic of tasks in Outlook?
    10·2 answers
  • The printer prints 16 pages every minute. How many pages are printed in 6 minutes?
    14·2 answers
  • Implement the Tollable interface. It provides one method, pay, that accepts an int (how many dollars to pay), and returns an int
    8·1 answer
  • What is problem scoping
    14·1 answer
  • How does links helped a student like you in navigating the different available websites?
    5·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!