1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
14

Which is the most used operating system? A. Windows B.Linux C.Leopard D. DOS

Computers and Technology
2 answers:
Neko [114]3 years ago
7 0
I think it´s either A. or  B.
DerKrebs [107]3 years ago
7 0
Windows is by far the most popular home computer OS.<span> Most desktop and laptop computers use Microsoft Windows. So the answer would be A. 

</span><span><span>90% of supercomputers </span>use Linux though. </span>

You might be interested in
One of the most famous ___ licenses is gpl, which ensures that a particular program remains free to distribute and allows its co
stich3 [128]
One of the most famous EULA licenses is GPL, which ensures that a particular program remains free to distribute and allows its code to be examined and modified by anyone. EULA stands for End User License Agreement. It is the agreement between the licensor and purchaser, where the <span>purchaser is given </span><span>right of using the software. 
GPL is the GNU General Public License.</span>
6 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Which represents the hierarchical structure of a Google Analytics account from top to bottom?
zlopas [31]

Answer: (D) Account > Property > View

Explanation:

 The Account > Property > View is the hierarchical structure of the google analytics account and it this hierarchical stricture basically represent from top to the bottom. The google account basically contain two and more properties for structuring the efficient accounts.

The property of the reporting view contain unique ID and it is the combination of digits and account ID. The view property in the analytic account basically used for access, analyzing and customize the data for viewing in proper way.

8 0
3 years ago
I can talk to you! How about we talk through the you know where people comment and say stuff about the question1
pychu [463]
Hmmm what do you want to talk about??
3 0
3 years ago
Read 2 more answers
How should a cover letter begin?
Alenkinab [10]
To professionally adress an introduction in a cover letter D. would be the correct answer.
4 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • Which type of image uses lossy compression to reduce file size?
    14·1 answer
  • Type 1 hypervisor:
    10·1 answer
  • When an organization uses cloud computing, they do not have to buy and maintain expensive hardware. Group of answer choices True
    6·1 answer
  • Before performing a Web Recorder task, which two options should the user ensure are setup correctly?
    6·2 answers
  • Describe how a web browser and web server work together to send a web page to a user
    8·1 answer
  • Lol WAKE UP!!! and get ready to answer my questions.
    12·1 answer
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
  • Animals living in burrows under the ground is an interaction between the biosphere and the
    11·1 answer
  • The code to perform a binary search is below. Match the variable name with what it holds.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!