1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Solnce55 [7]
2 years ago
13

Why might a company choose Linux for its operating system instead of Microsoft Windows or Mac OS? The company's employees can sy

nc their mobile devices to their computers. The company will not have to send its computers back to the manufacturer for repairs. The company does not have to worry about all the possible hardware configurations. The company can create an operating system to fit its specific needs.
Computers and Technology
1 answer:
insens350 [35]2 years ago
6 0

Answer:

D.

The company can create an operating system to fit its specific needs.

Explanation:

Linux is an open source operating system format, which can be modified to fit specific needs of it's users.

You might be interested in
What are the uses of computer in educational setting?
Arada [10]

Answer:

Quick Communication & Correspondence

Explanation:

Another main advantage of using computers in the education field is the improvement in the quality of teaching-learning process and communication between students & teachers. For this, they use Microsoft PowerPoint to prepare electronic presentations about their lectures.

8 0
3 years ago
Read 2 more answers
Eq-20 why is the height of a vhf radio antenna important
masya89 [10]
Reasons why the height of a VHF radio antenna is important is because VHF radios work by the line of sight principle.
Line of sight
its a line from observers eye to a distant point.its a line between two points specifically the straight path between a transmitting antenna (as for radio or television signals) and receiving antenna when unobstructed by the horizon.
7 0
3 years ago
Read 2 more answers
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Which feature in PowerPoint is used to correct common capitalization and text formatting issues but can also be modified for mor
bonufazy [111]

Answer:

AutoCorrect: D on edge

Explanation:

6 0
2 years ago
Question: How does Brainly's ban system work?
Dima020 [189]

Answer: well usually when you get banned on here it because someone reported your question or answer or something

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • If you have cable internet service, what protocol is used between the head end connection and the cable company's network
    8·1 answer
  • What is ment by creative middle way solution
    6·1 answer
  • When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
    15·1 answer
  • Explain how inflation flattens the universe
    6·2 answers
  • Convert the binary number into a hexadecimal number.
    7·1 answer
  • A) Suppose a computer has an instruction pipeline with 4 phases. How many cycles (if there are no delays) would it take to compl
    13·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • Can someone please give me timetable managment system with data structures in java?
    11·2 answers
  • Which of the following statements are true concerning abstraction and refinement? Select 3 options:
    14·1 answer
  • Use the drop-down menus to complete statements about audio file formats.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!