1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
15

A system administrator is selecting an operating system for use by the company’s research and development team. The team require

s an OS that can be easily modified and changed to meet its particular requirements.Which of the following operating systems will be the best choice for the users?A. Windows 10 EnterpriseB. Mac OS XC. LinuxD. Windows 7 Professional
Computers and Technology
2 answers:
Neko [114]3 years ago
8 0

Answer:

Option "c" is the correct answer for the above question.

Explanation:

The Linux operating system is an open-source operating system because the source code of this operating system can be modified when the user needs some different environment. The question scenario also demands these types of the operating system. Hence option c is the correct answer while the other is not because:-

  • Option 'a' states about windows 10 which can not be modified easily.
  • Option b states about the mac OS which can not be modified easily.
  • Option c states about windows 7, which can not be modified easily.
lys-0071 [83]3 years ago
5 0

Answer:

Linx

Explanation:

You might be interested in
If someone wouldn’t mind answering the first question for me
kompoz [17]

1.

  • Keep the title bold
  • <u>Underline</u> important statements
  • Colour the words (but the document shouldn't be too colourful)
8 0
4 years ago
Which of the following is NOT an example of editing?
Genrish500 [490]

Answer:

ang answer po at proofreading written

content

Explanation:

if I wrong please correction me!

8 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
4 years ago
Determine the output of the following code segment:
Nataly [62]

Answer:

The output to the given code as follows:

Output:

10

100

64

36

16

4

0

4

16

36

64

Explanation:

In the given java code, an integer variable "i" and an array number is defined, which size is 10, in the next step two for loop is declared, that can be described as follows:

  • In the first loop, array use loop variable "i" use, which minus the value of 5 and multiplies by 2, and it will calculate the square of that number.
  • In the next step, a for loop is declared, that prints these array number variable square.
7 0
4 years ago
You wish to lift a 12,000 lb stone by a vertical distance of 15 ft. Unfortunately, you can only generate a maximum pushing force
miss Akunina [59]

Answer:

Full question?

Explanation:

Sorry for asking this but where's what you want answered?

8 0
3 years ago
Other questions:
  • The ____ contains methods that allow you to set physical properties such as height and width, as well as methods that allow you
    14·1 answer
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • Is backing up computer files done on the hard drive?
    5·1 answer
  • Why is there more content on youtube in 4k then there is on cable, satellite, and digital tv combined?
    6·2 answers
  • Hilary works at Klothes Kloset. She quickly helps the customers, and her cash drawer is always correct at the end of her shift.
    9·1 answer
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • Florida Highway Safety and Motor Vehicles reported blank of traffic fatalities were alcohol-related in Florida in 2009.​
    8·1 answer
  • Suppose we perform a sequence of n operations on a data structure such that if some condition C(k) holds then the kth operation
    7·1 answer
  • Select the correct answer.
    5·2 answers
  • Short note on first generation computer​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!