1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
12

Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system, while Win

dows systems provide a much larger number of more specifically targeted security features used in the appropriate contexts. This may be seen as a trade-off between simplicity and lack of flexibility in the Unix/Linux approach, against a better targeted but more complex and harder to correctly configure approach in Windows. Discuss this trade-off as it impacts on the security of these respective systems, and the load placed on administrators in managing their security

Computers and Technology
1 answer:
GalinKa [24]3 years ago
4 0

Answer:

see my discussion as explained bellow

Explanation:

You might be interested in
Find 5 rational numbers between -1 and 1​
Alisiya [41]
1. = 0
2. =-0.5
3.=-0.75
4.=-0.875
5.=-0.9375
4 0
4 years ago
How do you represent a 3D object with unusual curves in 2D space? CAN SOMEONE HELP PLEASE
levacccp [35]
You have to draw the extra lines out
7 0
3 years ago
Which of the following are best and safe practices for shutting down a computer or disconnecting a device? Check all of the boxe
Mademuasel [1]
D and A because in order to be safe you need to unplug it to be safe
6 0
3 years ago
Read 2 more answers
Explain three ways you can get home safely if the friend you rode with has drugs or alcohol in his or her system and you prevent
Lelu [443]
You could organised to be picked up, call a taxi or a sober peer or take public transport.
7 0
4 years ago
Identify the components of documents merging
Lena [83]
There are 3 components of documents merging :

- input 1  , which contain the data source

- Input 2, which contain the main document

and

- Output 3, which contained the merged the documents
8 0
3 years ago
Other questions:
  • Where should i go if i want to begin learning how to code a video game. What are your recommendations to a 16 yr old to learn co
    13·1 answer
  • URGENT!!Motors and gears play an important role in the motion of robots. Discuss the different types of motors used in robotics.
    9·1 answer
  • Since cam systems regulate and self-mange the manufacturing process, you classify them as
    9·1 answer
  • A(n) ________ is an information system that works across national borders, facilitates communication between headquarters and su
    14·1 answer
  • The process of auditing the source code for an application to verify that the proper security controls are present, that they wo
    14·1 answer
  • Blank Are input instructions you give to a computer
    13·1 answer
  • Cuantos puntos de habilidad se puede tener en clubes pro?
    9·1 answer
  • __________ translates analog voice signals into digital data and uses the Internet to transport the data.
    7·1 answer
  • If an item that is purchased is digital, this may involve a direct ______ of the item you purchased.
    15·1 answer
  • In an etl process, data is loaded into a final target database such as:______
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!