1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
2 years ago
12

Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system, while Win

dows systems provide a much larger number of more specifically targeted security features used in the appropriate contexts. This may be seen as a trade-off between simplicity and lack of flexibility in the Unix/Linux approach, against a better targeted but more complex and harder to correctly configure approach in Windows. Discuss this trade-off as it impacts on the security of these respective systems, and the load placed on administrators in managing their security

Computers and Technology
1 answer:
GalinKa [24]2 years ago
4 0

Answer:

see my discussion as explained bellow

Explanation:

You might be interested in
Now that you have explored some of the possibilities for using Excel at home, what concerns or questions do you have about using
lora16 [44]

This seems like an opinionated question, I suggest attempting to answer it yourself.

8 0
3 years ago
Which item below is NOT output? A. monitor B. speakers C. printer D. mouse
Molodets [167]
D. mouse that is  your answer <span />
6 0
3 years ago
Read 2 more answers
I'm learning how to use Python in JES (Jython). i just need to know 1) how to do a robust copyIn and 2) how to call functions fr
BartSMP [9]

well make sure you access your files and make sure they are easily attainable.

4 0
2 years ago
What port is utilized by secure imap (imaps?
DedPeter [7]
TCP port used for SSL Secured.
8 0
3 years ago
Naomi wants to search for online courses on web development she types this term in the address bar which browser allows her to u
natka813 [3]
Google Chrome browser
4 0
3 years ago
Other questions:
  • W-11/6=4<br><img src="https://tex.z-dn.net/?f=%20%20%5Cfrac%7Bx%20-%2011%20%7D%7B%206%7D%20%20%3D%204" id="TexFormula1" title="
    14·1 answer
  • 5. The best way to clear your Reader is to
    6·2 answers
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • Can I use some Company's name in my Research Project. For example, my research is based on E-commerce security and i wanna use A
    14·1 answer
  • Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
    11·1 answer
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • You may have come across websites that not only ask you for a username and password, but then ask you to answer pre-selected per
    11·1 answer
  • your teacher has accidentally put the wrong names of the students on her excel science results sheet. What method can be used to
    7·1 answer
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!