1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
14

Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.

Computers and Technology
1 answer:
Nonamiya [84]3 years ago
3 0

Answer:

flamingo was here

Explanation:

You might be interested in
The border that defines the outer boundary of a shape or other object
Over [174]
The answer is outline
8 0
3 years ago
Compared to using a command line, an advantage to using an operating system that employs a gui is ________.
artcher [175]

Compared to using a command line, an benefit to using an operating system that employs a GUI exists you do not have to memorize complicated commands.

<h3>What is operating system?</h3>

An operating system (OS) exists as the program that, after being initially loaded into the computer by a boot program, contains all of the other application programs on a computer. The application programs create use of the operating system by completing requests for services through a specified application program interface (API).

A GUI utilizes windows, icons, and menus to carry out commands, such as opening, deleting, and moving files. Although a GUI operating system is especially navigated using a mouse, a keyboard can also be utilized via keyboard shortcuts or arrow keys.

The GUI, a graphical user interface, exists as a form of user interface that permits users to interact with electronic devices via graphical icons and audio indicators such as primary notation, instead of text-based UIs, typed command labels, or text navigation.

Hence, Compared to using a command line, an benefit to using an operating system that employs a GUI exists you do not have to memorize complicated commands.

To learn more about operating system refer to:

brainly.com/question/22811693

#SPJ4

7 0
2 years ago
What was the effect of the norman conquest on the language of britain?
Maslowich
Option c is answer because most of us are literature in English
6 0
3 years ago
What mode is generally used when delivering a presentation to an audience?
dybincka [34]

Answer:

delivery mode

Explanation:

there it is

7 0
3 years ago
Read 2 more answers
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
Other questions:
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • Identify the correct software or hardware applications in the passage below
    10·1 answer
  • What is used for World Wide Web?
    7·1 answer
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • Write a Python program to do the following:
    12·1 answer
  • Who put forward the idea of nanotechnology to the world?​
    6·1 answer
  • What is an issue with using cloud computing?
    15·1 answer
  • Which of the following best explains how the Internet is a fault-tolerant system?
    7·2 answers
  • The ____ file is typically saved with a prefix of inc_.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!