1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
15

Which operating system (OS) is used to run your laptop?

Computers and Technology
2 answers:
CaHeK987 [17]3 years ago
3 0

Answer:

Windows or Linux

Explanation:

It would most likely be windows but theres not enough information to make a sure decition.

solmaris [256]3 years ago
3 0

Answer:

The most known one are, macOS, Windows, and Linux.

Bonus: The most known smartphone operating systems are Android and iOS

Explanation:

You might be interested in
which of the following statements about servers is correct A. servers are computers on a network that share their resources with
givi [52]
A server can have many definitions, but in this particular case, the answer is A.  
7 0
3 years ago
Read 2 more answers
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
1. How are computers helpful
d1i1m1o1n [39]

Answer:

Brainliest

Explanation:

It’s hard to imagine banks without technology. In fact, computers have been in use in banking since the 1950s, when Bank of America introduced a computer designed specifically for processing checks. Each new decade has brought innovations that change the way banks manage daily operations and serve customers. Today, you may not even leave your house to do your banking. As much as technology has changed the use of the computer in the banking sector, banks continue to adjust the way they do things.

8 0
3 years ago
Cloud offers better protection compare to on premise?​
dangina [55]

Why is cloud better than on-premise? Dubbed better than on-premise due to its flexibility, reliability and security, cloud removes the hassle of maintaining and updating systems, allowing you to invest your time, money and resources into fulfilling your core business strategies.

The security of the cloud vs. on-premises is a key consideration in this debate. Cloud security controls have historically been considered less robust than onprem ones, but cloud computing is no longer a new technology. . A company running its own on-premises servers retains more complete control over security.

Believe it!!

Pls follow me.

6 0
3 years ago
To quickly save a file, use the keyboard shortcut ________. ctrtl shift s ctrl s ctrl a ctrl shift-a
Advocard [28]
You have to use control + s only. but if you want to save it in different format, use control + shift + S
3 0
3 years ago
Other questions:
  • What is ucspi-tcp pakage in qmail??
    5·1 answer
  • What does this image represent?
    9·2 answers
  • Antifreeze is not considered a hazardous waste by the EPA unless it is used or otherwise becomes contaminated.
    13·2 answers
  • Create a recursive method, a method that calls itself, that returns the number of vowels that appear in any string given. Keep i
    11·1 answer
  • Complete the following sentence.
    7·1 answer
  • How do you create multiple columns in Word?
    12·1 answer
  • Example of Not a computer characteristics example
    12·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • How do we explain the difference between fake news and facts​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!