1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
15

Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?

Computers and Technology
2 answers:
Xelga [282]3 years ago
6 0

Put a code or security system on or a very secure password

Hope this helps...

ahrayia [7]3 years ago
3 0

Answer:

OS Login feature

Explanation:

In operating system such as Windows, Mac OS and Linux, there is always an OS Login feature that prevent unknown or unauthorized users from accessing the system. The OS Login feature will require users to input their username and password to authenticate their identity before they can access the system.

In a more advanced level, the OS Login can also request fingerprint or face recognition for identity authentication.

You might be interested in
What countermeasures would you recommend to defend against routing attacks?
Alla [95]

Answer:

 The countermeasure is basically recommended against the attackers for defending various routing attacks. Routing is one of the most generally assaulted segments in a system and a lot of system the executives work centers around checking conduct of switches.

The single router has more than one unit for bundle handling. This encourages quicker handling. This preparing unit is finished programming which can be undermined by an aggressor.

So an additional free equipment is implanted into the switch which can do observing to recognize the product assaults. Maintain a strategic distance from over composition the addresses.

Be movement at time when all of a sudden if anything incorrectly happens we should be in a situation to deal with and deal with the issue since it causes more harm when time runs.

3 0
3 years ago
Hi guy how do i make money in app cuz im desperate for 1 right now​
Margarita [4]

Answer:

we need context

Explanation:

7 0
3 years ago
Read 2 more answers
What does firewall do
Bogdan [553]

Answer:

help

Explanation: to make people blocked on school computer

4 0
3 years ago
Cultural differences may make it difficult for team members to _____. Select 4 options.
ludmilkaskok [199]

Answer:

A) collaborate with each other

C) achieve business objectives

D) understand each other

E) resolve conflict and problems

Explanation:

Well lets use the process of elimination. If there are cultural differences then there are different cultures involved. So B doesn't work because it's multicultural when there is different cultures. And you need 4 answers out of 5, so all you need to do is eliminate one answer.

Good Luck! You got this!

6 0
3 years ago
The primary safety consideration when working with computers is ___
docker41 [41]
I would say safety. Not putting too much information about yourself on the internet is a good thing to do, because people can follow you (in a bad way). Another thing to think about is not putting information about others if they do not want it on the internet. Also, be careful while you are around computers. You do not want to spill any water on it, or drop it.
3 0
4 years ago
Read 2 more answers
Other questions:
  • Why does esherick say the name of the boxer rebellion in inaccurate
    5·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • Which feature of virtualisation helps increase the IT productivity of a business
    14·1 answer
  • ¿Por qué es importante generar proyectos innovadores?
    8·1 answer
  • A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
    7·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • DNA structure can be described as a twisted ladder. Imagine you are climbing a model of DNA, just as if you were climbing a ladd
    10·2 answers
  • A keyboard shortcut to pasting in a document is to key _____.
    8·1 answer
  • Why is computer called information processing maching???​
    6·2 answers
  • Which of the following statements is true for plotly?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!