1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
devlian [24]
2 years ago
14

Window is a very popular operating system becouse of its _ environment .​

Computers and Technology
2 answers:
taurus [48]2 years ago
6 0
Windows is perhaps the most popular operating system for personal computers globally. ... Windows is very popular because it is pre-loaded in majority of the new personal computers. Compatibility. A Windows PC is compatible with most software programs in the market
Inga [223]2 years ago
4 0
Window is a vary popular operating system because of its runtime and compatible environment .
hope it help
You might be interested in
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
2 years ago
An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about
kozerog [31]

Answer:

B

Explanation:

6 0
3 years ago
Read 2 more answers
An automotive engine’s camshaft rotates?
ryzh [129]
<span>C. The same speed as the crankshaft..... hope this helps!
</span>
8 0
3 years ago
What device connects a lan's switch to the next network? qizzlets?
laila [671]
I think you can call it to a Network Switch, but LAN is always used device network: Hubs and Switch or maybe Connect Device or Cable.
6 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Other questions:
  • The most popular input device of a computer is a(n) ____.
    6·1 answer
  • Transparency is an important concept in policies related to the handling and use of customer data. Organizations should be trans
    5·1 answer
  • How to burn mp3 on dvd
    13·2 answers
  • A network administrator wants to logically separate web servers on the network. Which of the following network device will need
    10·2 answers
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • Doctors at a regional hospital access an online database of patient records that is being developed and tested by a conglomerate
    13·1 answer
  • I NEED HELP QUICK
    9·1 answer
  • What caused accident? into passive voice​
    13·1 answer
  • Answer for 5,6,7 any one know plz
    8·1 answer
  • Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!