1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
15

8. Explain strategies employed by the operating system to ensure safety of programs and data in

Computers and Technology
1 answer:
Ugo [173]3 years ago
3 0

Answer:

is the process of ensuring OS integrity, confidentiality and availability. ... OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised.

You might be interested in
The programmer must initialize variables when they are declared
lorasvet [3.4K]

Answer: When you declare a variable, you should also initialize it. Two types of variable initialization exist: explicit and implicit. Variables are explicitly initialized if they are assigned a value in the declaration statement. Implicit initialization occurs when variables are assigned a value during processing.

Explanation:

For example, in JavaScript

var PaintAmount = 50; -declare and initialize  

function setup() {

   creatCanvas(200, 200);

}  

function draw() {

   ellipse(PaintAmount, PaintAmount) -use the variable PaintAmount

}

or rather in Java,

package random;

public class something() {

Public static void Main(String []args) {

        string name;  // this is declaring the variable with the example type  

     

       string name = new string; //this initializes the declared variable

}

}

6 0
3 years ago
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.
Sedbober [7]

Answer:

developed and tested.

Explanation:

5 0
2 years ago
What is the minimum recommended point size for presentation text?<br> 12<br> 24<br> 36<br> 48
Darya [45]
The answer would be 24
6 0
3 years ago
Topic: Drivers ed 100 points and brainliest!
ddd [48]

Answer: Ill explain it!

Explanation: Modern technology is extremely beneficial to drivers because the modern cars have sensors that detect the range of other cars, when they stop and you might not see or be ready for it, your car will slam the brakes for you, this alone saves many lives. Another is like a Tesla with autopilot. Lets say for example one day your really sleepy or dont feel good, its a stress to keep the car straight. You could turn on autopilot and it could assist you with your driving, and their system has shown to be for the most part very beneficial and responsive. I would say another would be cameras above traffic lights watching for speeders and getting their license plates. This is important because people who are being risky and causing hazards on the road will get a fat ticket and will be seeing court. They are less likely to run a red light if they see a camera watching. I hope this helps you!

3 0
3 years ago
Other questions:
  • a certain battery can supply 6 J of energy to every coulomb of charge moving through a circuit. if the circuit consists of two i
    13·1 answer
  • Which of the following is NOT a consideration designers must make when using colors?
    15·1 answer
  • How do you take a screen shot with a toshiba computer?
    13·2 answers
  • The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
    13·1 answer
  • What is the purpose of a destructor? (g) What is the purpose of an accessor?
    7·1 answer
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • If you want to go directly to a specific web page using a URL, where should you type the URL in Firefox?
    14·2 answers
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • What symbol shows autocorrect is in use in access? WILL MARK BRAINLIEST FOR WHOEVER ANSWERS FIRST!!!
    5·1 answer
  • The four main disabilities or impairments that computers can modify are for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!