1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
15

Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?

Computers and Technology
2 answers:
Xelga [282]3 years ago
6 0

Put a code or security system on or a very secure password

Hope this helps...

ahrayia [7]3 years ago
3 0

Answer:

OS Login feature

Explanation:

In operating system such as Windows, Mac OS and Linux, there is always an OS Login feature that prevent unknown or unauthorized users from accessing the system. The OS Login feature will require users to input their username and password to authenticate their identity before they can access the system.

In a more advanced level, the OS Login can also request fingerprint or face recognition for identity authentication.

You might be interested in
Upload your completed project including the following:
SOVA2 [1]

Answer:Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.

Explanation: YWW FRIEND!!

7 0
3 years ago
What does it mean to clear a setting in a dialog box?
yaroslaw [1]

Answer:

to delete it

Explanation:

5 0
3 years ago
1: define about information system in computer?
kobusy [5.1K]

Explanation:

1. Information system is a collection of people, procedures, software, hardware, and data to provide essential information to run an organization.

2. Thesaurus is a software tool used in Microsoft Word document to provide synonyms and antonyms for a selected word.

3. Computer component refers to a basic physical element that is required by the computer to function.

5 0
3 years ago
What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
kiruha [24]

The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

<h3>What is a delimited file in Excel?</h3>

The term "Delimited" is known to be a term that connote a form of  an  TXT file that tends to make use of tabs or an  CSV file that uses commas to  be able to separate and group your data.

Note also that a  delimited file is seen as a form of a given sequential file that is made up of column delimiters.

Therefore, The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

Learn more about text format from

brainly.com/question/16397886

#SPJ1

Multiple Choice

fixed-width format

extensible markup

delimited format

hypertext format

6 0
2 years ago
The average numbers of shares a piece of content receives is known as its:
tino4ka555 [31]

Answer:

Amplification.

Explanation:

Social media publishing can be defined as a service that avails end users the ability to create or upload web contents in either textual, audio or video format in order to make them appealing to a target audience.

Thus, these web contents are generally accessed by end users from time to time through the use of various network-based devices. As users access these contents, they're presented with the option of sharing a particular content with several other people a number of times without any form of limitation.

Hence, the average numbers of shares a piece of content receives is known as its amplification. The higher the average numbers of shares a particular content receives, the higher the number of traffic it generates for its publisher.

3 0
3 years ago
Other questions:
  • Different units of CPU ?
    12·1 answer
  • A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have d
    11·1 answer
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • Ancestor(X,father(X)) and ancestor(david,george) is they unify or not
    11·1 answer
  • How should a Salesforce Admin fulfill those requirements? Universal Containers launches a Partner Community for their resellers
    13·1 answer
  • A mobile application delivers market predictions based on stock data from the stock market data platform. Knowing that the data
    12·1 answer
  • Answer any one: write a computer program:which you know.​
    6·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
  • How will technology help people with disabilities become more transportation independent?.
    5·1 answer
  • Why does python code generate fewer types of syntax errors than code in other programming languages?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!