1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
3 years ago
10

The Linux operating system is widely used in industry, especially for servers. Why do you believe this is the case?

Computers and Technology
1 answer:
Anit [1.1K]3 years ago
6 0

Answer:

Asking why Linux is used as a server operating system? It has many advantages

Explanation:

1. Linux has very small kernel footprints

It can be on a USB, embedded system and the like.

2. Requires very little hardware resource to run.

Building on the first point, Linux dos not need much jard ware resource to run implying it can be run on outdated CPUs, a low RAM size, small disk space and it would be possible - doesn't matter with Linux - bar the effect on performance.

3. Linux runs 80% of the Internet today

4. It's free

...... and so much more.

- Reference: Andrew Holcomb, Quorate

How Linux compares with other OS - like Windows or Mac?

May Help:

https://www.quora.com/What-are-the-advantages-of-Linux-as-a-server-operating-system

Recommendation: Jason Montoya and Glen Becker, BI Analyst, SAS Expert

You might be interested in
The most common types of utility programs fall into these categories.
avanturin [10]

Answer:

file management

Explanation:

correct me if I wrong

7 0
3 years ago
Which of the following criteria was a key milestone for the object-relational model created in the mid-1980s?
gladu [14]

The use of the inheritance to have a structure inherit attributes and methods of classes above it.


One of the key milestones in the period in which the object-relational model was created was the creation of a data
model that closely represented the real world. In this approach, objects were created in which both data and its
relationships were all contained in one place. These data models were becoming a norm to be stored on the web. They
also incorporated support for star schemas within data warehouses. Objects that had similar characteristics were
grouped into classes, where they had a shared structure of attributes and behaviors.

3 0
2 years ago
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
DochEvi [55]

Answer:

A (because you can't have a chart without information, right?)

brainliest plz

Explanation:

8 0
3 years ago
Read 2 more answers
Daily STEM Newsletter Questions 5
Alexxx [7]

Answer:

32

Explanation:

A duck has 2 wings, a spider has no wings and a cat also has no wings. So a cat costs as much as a spider.

5 0
3 years ago
You have a network that uses a logical ring topology. how do messages travel through the network"
RSB [31]
Messages travel from one computer to another until they will find a proper computer to whom that message is addressed.
7 0
3 years ago
Other questions:
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • When you don't have enough room to stop, you may _______ to avoid what's in front of you. A. speed up B. steer away C. brake
    7·2 answers
  • Use ___________ positioning to configure the location of an element to remain the same and to not move even when the web page is
    6·2 answers
  • Over the past few years a very definite need has arisen in the electrical trades for:
    15·1 answer
  • What features are offered by most of the email programs with for receiving and sending messages?
    10·1 answer
  • Which types of files are saved with the .mp3 and .zip extensions?
    12·2 answers
  • C. What is the computer memory? What is the role of the memory in a computer?​
    14·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!