1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
15

8. Explain strategies employed by the operating system to ensure safety of programs and data in

Computers and Technology
1 answer:
Ugo [173]3 years ago
3 0

Answer:

is the process of ensuring OS integrity, confidentiality and availability. ... OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised.

You might be interested in
a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of publ
leonid [27]

Answer:

adsfafdfads

Explanation:

afdafdsa

8 0
3 years ago
Janelle went to update the last name for one of her group contacts. She double-clicked on the contact, changed the last name, an
Ivanshal [37]
Janelle should have clicked Save & Close to close the contact.
5 0
3 years ago
Read 2 more answers
when a picture is downloaded off the internet and then posted to social media, can the social media platform tell it was downloa
Nataly_w [17]
Short answer yes. kinda long answer people can scan the photo and easily see or they can just look up the same image
4 0
3 years ago
What is the main advantage of using a WYSIWYG("what you see is what you get")editor when constructing a website
Tomtit [17]

Answer:

c

12121212121212121212121212121221212121212121212

7 0
3 years ago
What are the characteristics of the Outlook Rules Wizard? Check all that apply.
Marina CMI [18]

Answer:It is useful for staying organized.

Users can edit the rule description.

Users can move messages to folders.

It is divided into three template choices.

Explanation:

7 0
2 years ago
Other questions:
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • Which situation can result in positive population growth?
    14·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • A method's name and parameter list constitute the method's ____.
    13·1 answer
  • Jane is debugging a code consisting of 25 lines. The code starts executing at line 11. At line 13, the code calls another method
    10·2 answers
  • Briefly summarize two examples of cybercrime stories.<br> quick pleaseeee
    10·1 answer
  • Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
    10·2 answers
  • Can i edit my name on this app?
    7·1 answer
  • Plz subscribe my yt gaming channel <br>FIREAZZ GAMING​
    8·2 answers
  • Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!