1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
6

Mac and PC .Which one is better for professional users, and why

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
3 0

Answer Explanation:

  • Mac is a computer which is made to run its own operating system that is mac operating system which usually takes less resources and PC uses windows OS which take more resources than mac operating system
  • mac is better for the people who work on graphics and video editing PC are more useful for those who perform logical task.
  • mac is both hardware and software but normal PC have different brands as like lenovo , dell, acer etc which uses windows software
  • so we can say that mac is better for professional user than PC

You might be interested in
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
A class named clock has two instance variables : hours (type int ) and isticking (type boolean ). write a constructor that takes
Leno4ka [110]
<span>I guess you need it written in Java. So if you need only constructor, then here it is:
public Clock(Clock clock1) {
          this.hours = clock1.hours;
          this.isTicking = clock1.isTicking;
}

This code is 100% correct</span>
3 0
3 years ago
Which are examples of databases? Check all that apply.
Licemer1 [7]

Answer:

a set of stored information related to banking clients' transactions

Explanation:

7 0
3 years ago
Read 2 more answers
What is the basic facilities, services, and installations needed to keep a
lara31 [8.8K]

Answer:

transportation and communications systems, water and power lines, and public institutions like schools, post offices, and prisons.

Explanation:

7 0
2 years ago
Which of the following is a bullet type in the &lt;ul&gt; tag?
dybincka [34]

Answer:

That would be (d) All of these. I hope this helps you!

8 0
3 years ago
Other questions:
  • When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
    8·2 answers
  • What are the benefits of using presentations to organize and deliver information?
    8·1 answer
  • During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
    5·1 answer
  • Do all light bulbs server a practical purpose?
    14·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • Consists of a variety of circuitry and components that are packaged together and connected directly to the motherboard. it perfo
    5·1 answer
  • Instructions
    8·1 answer
  • 17. Ano ang tawag sa pahina ng Excel?
    12·1 answer
  • The act of getting information out of memory storage
    6·1 answer
  • PLEASE HELP! I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please he
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!