1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
8

Mac os is based on the ____ operating system.

Computers and Technology
1 answer:
ankoles [38]3 years ago
4 0
Mac os is based on the UNIX operating system.
You might be interested in
The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
Solnce55 [7]

Answer:

import java.util.Scanner;

public class BarChart {

public static void main(String[] args) {

Scanner sc=new Scanner(System.in);

//take input from user

System.out.println("Enter Score");

int score=sc.nextInt();

int count=score/10;

int i=1;

//print horizontal bar

//if you want to print vertical bar then simply change into print which is replace by println

while(i<=count)

{

System.out.print("*");

i++;

}

}

}

Explanation:

6 0
3 years ago
The measure of how quickly things may be converted to something of value is called.
Airida [17]

Answer:

liquidity. is a measure of how quickly things can be converted to something of value like cash. commodity money. based on some item of value.

Hope this helps! If so please mark brainliest and rate/heart to help my account if it did!!

3 0
3 years ago
Read 2 more answers
Rewrite this method so that it avoids the use of a return statement:
olganol [36]
Sorry we chose 0 for the denominator
8 0
3 years ago
Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
Paha777 [63]
<span>Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: Malicious code
Malicious code is often created to steal some information from another user without they realizing it, such as address, credit card number, social security number, email password, etc.</span>
4 0
3 years ago
which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
Ratling [72]

The statements that are true regarding incoming and outgoing interfaces in firewall policies are:

  • A zone can be chosen as the outgoing interface.
  • -Multiple interfaces can be selected as incoming and outgoing interfaces.

<h3>What is a firewall?</h3>

A firewall is a network security device used in computing that monitors and regulates incoming and outgoing network traffic in accordance with pre-established security rules. Typically, a firewall creates a wall between a trustworthy network and an unreliable network, like the Internet.

A firewall aids in defending your network from intruders. A firewall protects your network by operating as a continuous filter that constantly scans incoming data and blocks anything that appears to be suspicious.

Therefore, the statements that are true regarding incoming and outgoing interfaces in firewall policies are:

A zone can be chosen as the outgoing interface.

-Multiple interfaces can be selected as incoming and outgoing interfaces.

Learn more about firewall on:

brainly.com/question/13693641

#SPJ1

Which statements are true regarding incoming and outgoing interfaces in firewall policies? (Choose two.)

Select one or more:

-An incoming interface is mandatory in a firewall policy, but an outgoing interface is optional.

-A zone can be chosen as the outgoing interface.

-Only the any interface can be chosen as an incoming interface.

-Multiple interfaces can be selected as incoming and outgoing interfaces.

4 0
2 years ago
Other questions:
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • What error, if any, is in the following code?
    11·1 answer
  • Different units of CPU ?
    12·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • The fill command try’s to fill or generate content for cells based on a ________.
    15·1 answer
  • Can I change my username?
    6·1 answer
  • What was used to enhance silent films of the early 1900s
    15·1 answer
  • Which format of image files can be inserted in html?​
    8·2 answers
  • What is net pay?<br> What is net pay?
    11·2 answers
  • The second generation of computer languages is a higher-level language than
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!