1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
12

Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system, while Win

dows systems provide a much larger number of more specifically targeted security features used in the appropriate contexts. This may be seen as a trade-off between simplicity and lack of flexibility in the Unix/Linux approach, against a better targeted but more complex and harder to correctly configure approach in Windows. Discuss this trade-off as it impacts on the security of these respective systems, and the load placed on administrators in managing their security

Computers and Technology
1 answer:
GalinKa [24]3 years ago
4 0

Answer:

see my discussion as explained bellow

Explanation:

You might be interested in
__________ often causes overactive eye movement.
shepuryov [24]
The answer is ; D , xanax
3 0
3 years ago
Read 2 more answers
Describe the Pointer with example?​
kodGreya [7K]

Answer:

A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.

7 0
3 years ago
Read 2 more answers
What is printed by the following program provided all necessary standard header files are included? Explain each line of the out
Ostrovityanka [42]

<u>Output:</u>

f1 in A

f2 in A

f1 in B

f2 in A

f1 in A

f2 in A

f1 in B

f2 in B  

<u>Explanation:</u>

In this snippet, the code makes use of virtual functions. A virtual function is defined as a function that is defined in the base class and redefined in the derived class. If the derived function accesses the virtual function, the program will get executed with the derived class’s version of the function.

In this code, we define the virtual function f1() in class A and also redefine it in class B which is the derived class of A. While executing the program, the function g which takes the object b (class B’s object) as a parameter. It will print class B’s version of f1() rather than class A’s version. This is working off the virtual function.

8 0
3 years ago
Connect research concepts to their definitions
stellarik [79]
Answer Research is defined as the creation of new knowledge and/or the use of existing knowledge in a new and creative way so as to generate new concepts, methodologies and understandings
8 0
2 years ago
An asterisk (*) following a cell reference in a formula is the arithmetic operator that directs excel to perform the division op
lubasha [3.4K]
You are correct there. the * operand tells Excel to multiple the two cells or variables.
7 0
4 years ago
Other questions:
  • Which function is used to display a string value to the screen?
    8·1 answer
  • Write a static method named listcountriesoforigin, to be added to the bowl class, which is passed an array of bowl objects, and
    13·1 answer
  • In which year was chip used inside the computer for the first time?? ​
    14·2 answers
  • Describe what a structure is in a living thing?
    9·1 answer
  • write a loop that reads positive integers from standard input and that terminates when it reads an integers that is not positive
    11·1 answer
  • Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
    7·1 answer
  • Which of the following is true of e-learning and computer-based training (CBT)?
    13·1 answer
  • In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
    13·1 answer
  • PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT
    5·1 answer
  • "The constructor signature is defined as the constructor __________ followed by the __________. (3 points)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!