1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
10

Compared with other PC operating systems, the

Computers and Technology
2 answers:
Mila [183]3 years ago
8 0

Answer:

c

Explanation:

Tresset [83]3 years ago
3 0

Answer:

C. Is typically only available on Apple hardware.

Explanation:

You might be interested in
What is a collection of computer programs that administer the hardware and software of a computer so that they work properly?
slega [8]

Answer:

Operating system

Explanation:

Operating system is a system software that manage all the software and hardware on a computer. It is the most important software in a computer. Operating system coordinates the entire communication process between software and hardware to ensure they work properly. It also manages the computer resources such as memory and storage spaces.

Some popular operating systems include Microsoft Windows, Mac OSX and Linux.

5 0
3 years ago
What is a device driver?
ivann1987 [24]

The answer is A. Dude it shows a input device. It’s basically a disc driver

8 0
3 years ago
Read 2 more answers
__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
vitfil [10]

Answer:

Cryptography

is the correct answer.

Explanation:

<h2><u>Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />

Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:

  • Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
  • Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
  • Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
  • Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.

<h3>I hope it will help you!</h3>
5 0
3 years ago
What is the full form of icimod?
wolverine [178]

Answer:

The International Centre for Integrated Mountain Development (ICIMOD) is a regional intergovernmental learning and knowledge sharing centre serving the eight regional member countries of the Hindu Kush Himalayas: Afghanistan, Bangladesh, Bhutan, China, India, Myanmar, Nepal, and Pakistan.

5 0
2 years ago
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
Leni [432]

Answer:

iptables

Explanation:

On a Linux system, iptables command allows us to modify settings of the built-in packet filtering firewall.

Iptables is used to set up, maintain, inspect and update the tables of IP packet filtering rules on Linux.

For example,

  • To view the current rule settings we can use the command:

# iptables -L -n -v

  • To add new firewall rules:

# iptables -I INPUT <rule number> -s <source-ip address> -j DROP

7 0
3 years ago
Other questions:
  • Which of these options would likely have a better playback experience in your presentation?
    8·2 answers
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • An ISP is considering adding additional redundant connections to its network. Which of
    5·1 answer
  • Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Pac
    5·1 answer
  • Where is information stored in the computer?​
    9·1 answer
  • What is the top 3 cloud provider in the world with statics or data including the example and reason(s).
    11·1 answer
  • Multiple choice:
    12·2 answers
  • Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of charac
    13·1 answer
  • Which option ensures that items in a text box or table cell will be in the absolute center of that element?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!