1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
13

Which of the following may present a problem for Linux users?

Computers and Technology
2 answers:
motikmotik3 years ago
6 0
Tendancy to crash hope that helped
egoroff_w [7]3 years ago
3 0

Answer:

Tendency to crash

Explanation:

Linux operating system is an open source system that is vulnerable to hackers because of the easy access to its source code. with the access to its source code hackers can have access to data that they are not supposed to have access to on the system that has Linux installed in it as it's operating system and also crash the system.but this is very difficult with other operating systems like Windows.

Linux like other operating system have a GUI graphical user interface and its also vulnerable like others to viruses.

Linux is one of the most popular and most widely used due its access to sources code .

You might be interested in
What is a functionalist perspective of cell phones, internet and personal computers?
Sedbober [7]
<span>As these technologies are rapidly evolving a functionalist would say that they unbalance the equilibrium of the social state, and is therefore undesirable as there is more interaction and adaptation of habits from other societies. But they also say that it's not a good thing to change immediately because it might disrupt the society. Therefore it has to change slowly. </span>
3 0
3 years ago
What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How mig
bazaltina [42]

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

8 0
3 years ago
What guidance identifies federal information security controls?
Vladimir79 [104]

Answer:

<u>FIPS</u> <u>Publication</u> <u>2</u><u>0</u><u>0</u>, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
What does limited access to a document mean?
Licemer1 [7]
The second last one is the answer i think
7 0
3 years ago
Read 2 more answers
Help me help you...........
lyudmila [28]

Answer:

the 4th answer

Explanation:

w stage for width, h for height.

6 0
2 years ago
Other questions:
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • Data values in a program are held in _________. a data types b names c variables d lockers
    11·1 answer
  • In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
    14·1 answer
  • A package that includes hardware, software, and support from a single vendor is called a(n ____ package.
    6·1 answer
  • One of the first feature films to use 3D animation was called ________. Water World Futureworld Wayne’s World Cool Hand Luke
    7·2 answers
  • How Extreme Programming addresses Software Testing andevolution ?
    14·1 answer
  • What kind of software is Microsoft Outlook??
    15·2 answers
  • Can someone please please please help me!
    10·1 answer
  • What is the purpose of a format painter in Word?
    15·2 answers
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!