1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
8

A Multi-Node computing platform utilized to share computing resources and characterized by centralized administration. This is a

..... environment
A.Multi-Programming
B.Peer-to-peer
C.Parllel.
D.Distributed
E.Cluster.​
Computers and Technology
1 answer:
hjlf3 years ago
6 0

Answer:

B

Explanation:

Multi-Node

You might be interested in
The clerk ordered three ribbons, 12 markers, and 15 erasers.
Arada [10]

17 is in all okay my friend

8 0
3 years ago
How dependent are we on technology? ​
rusak2 [61]

very independent  : ) we use it for everything

3 0
4 years ago
Read 2 more answers
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
If html is used to specify the content of the webpage, then what do you use css for?.
alekssr [168]

Answer:

css for styling.. means for making websites looks beautiful and attractive

Explanation:

html is like skeleton which defines websites structure whereas css is like cover to the skeleon.. css is responsible for fonts, colors, position of elements, responsiveness of websites.. it makes websites looks beautiful and prettier by adding background colors, hover effects, animation, etc

6 0
3 years ago
Other questions:
  • which of the following is not an operating system? A. leopard B. linux C. firefox D. windows
    11·2 answers
  • What career is likely to have to highest salary
    14·2 answers
  • Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to
    14·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    7·2 answers
  • Networks can be classified by geographical scope as PANs, , and WANs. The cables and signals used to transport data from one net
    9·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    10·1 answer
  • One of the biggest changes to affect the internet will be the continuing adoption of a new version of the internet protocol, ver
    5·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • HELP ME PASS!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!