1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
10

Linux is not secure as it is difficult to detect bugs and fix true or false plz reply

Computers and Technology
1 answer:
Mazyrski [523]3 years ago
8 0

False.

Linux is the most secure operating system

You might be interested in
How can information technology transform the way business processes in an organization
timurjin [86]

Answer:

1. Through cooperation.

2. Understanding the market and the organization.

Explanation:

Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.

An information Technologist can change the way business process if he or her understand the maker of the company and the company.

The major point is this:

1. The company must cooperate.

2. Everybody must accept change for it to grow higher.

3. Understand the market of the company and

4. understand the company and how they operate and then change and replace the parts that need replacement.

6 0
3 years ago
What is modem please give me answer​
rjkz [21]

Answer:

a combined device for modulations and demodulations

4 0
4 years ago
Evaluating sorts given the following array: 41, 32, 5, 8, 7, 50, 11 show what the array looks like after the first swap of a bub
irga5000 [103]

The way that  the array will looks like after the first swap of a bubble sort in ascending order is   {5,32,41, 8,7,50,11}.

<h3>Who do you Write sort code in JAVA?</h3>

It will be:

class SSort

{

  void sort(int array[])

  {

      int n = array.length;

      for (int i = 0; i < 2; i++)

      {

          int minimum_index = i;

          for (int j = i+1; j < n; j++)

              if (array[j] < array[minimum_index])

                  minimum_index = j;

           int temp = array[minimum_index];

          array[minimum_index] = array[i];

          array[i] = temp;

      }

  }

   void printArray(int array[])

  {

      int n = array.length;

      for (int i=0; i<n; ++i)

          System.out.print(array[i]+" ");

      System.out.println();

  }

  public static void main(String args[])

  {

      SSort s = new SSort();

      int array[] = {41, 32, 5, 8, 7, 50, 11};

      s.sort(array);

      System.out.println("After first two iteration of Selection sort:");

      s.printArray(array);

  }

}

Therefore, The way that  the array will looks like after the first swap of a bubble sort in ascending order is   {5,32,41, 8,7,50,11}.

Learn more about array  from

brainly.com/question/26104158

#SPJ1

8 0
2 years ago
What are the two features of EDIAC ?​
Sergio [31]

Answer:

By the numbers: “The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors, 10,000 capacitors, 1,500 relays, 6,000 manual switches and 5 million soldered joints. It covered 1,800 square feet (167 square meters) of floor space, weighed 30 tons, consumed 160 kilowatts of electrical power.” More info

3 0
2 years ago
To create a nonlinear presentation that had external links the designer should
laila [671]

Answer:

To create a nonlinear presentation that had external links the designer should include “hyperlinks”

Explanation:

Let us understand what non-linear presentation is. It’s a reverse of linear presentation. A linear will go slide by slide, without any jump. A non-linear slide is a type of presentation prepared when the flow of slide is not much important, and the presenter can jump to any of the slide from any slide. This is done thorough two ways. 1. Hyperlink 2. Action button

We must include hyperlinks or action buttons where it allows us to toggle or navigate to any of the slide within the file. The hyperlink can also be added to move the control to a website.

6 0
4 years ago
Other questions:
  • Two students are discussing the flow of electricity. Student A says that voltage is a measure of the amount of electron flow in
    8·1 answer
  • Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
    8·1 answer
  • Largest of five (5 points). Write an algorithm that read 5 distinct integers and displays the largest value. Assume the input va
    14·1 answer
  • Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and upda
    11·1 answer
  • In excel, a number can contain the characters__
    8·1 answer
  • Dogs are great pets for families because they teach children many important life lessons. (2) A dog must be walked and fed at ce
    7·2 answers
  • Suppose that you have the following declaration:
    7·1 answer
  • You are creating a query for a website. The query
    5·1 answer
  • Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide are
    5·1 answer
  • Ups developed software called ____ to enable u.s. customs and border protection agents to inspect packages that pass through the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!