1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
8

Which manufacturing industry makes semiconductors that are used in a variety of systems?

Computers and Technology
1 answer:
aleksley [76]3 years ago
7 0
Transportation equipment
You might be interested in
What is an input to the Program Increment Planning process that highlights how Product Management plans to accomplish the Vision
Tatiana [17]

Answer:

Business Context

Explanation:

The input "business context" is an input to Program Increment Planning that helps understand what is the vision in Product Management.

6 0
3 years ago
Windows pe includes networking components and allows you to use current windows drivers for network connectivity.
4vir4ik [10]
Indeed it is very true
4 0
3 years ago
In a presentation, bullets in a text box will do which of the following?
lbvjy [14]
I'm almost certain that it is A. "Help you present your data with concise statements". Hope this helped :) Xx
8 0
3 years ago
Which generation is characterized by conspicuous consumption?
yulyashka [42]

Answer:

The is the type of consumption is typically associated with the wealthy but can also apply to any economic class.

Explanation:

7 0
3 years ago
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
Other questions:
  • Which of the following is considered part of the process in the systems thinking example of a TPS?
    6·1 answer
  • How do you represent (decimal) integer 50 in binary
    7·1 answer
  • Apollo Couriers, a company providing international express mail services, has a proactive customer communications team. The prim
    8·1 answer
  • Give a detailed easy to understand explanation what the kerneltrapmode is. WILL AWARD BRAINLIEST!
    13·1 answer
  • A bank is experiencing a DOS attack against an application designed to handle 500IP-based sessions. In addition, the perimeter r
    11·1 answer
  • It is the ornamentation of textiles and other material with needle work
    7·1 answer
  • If your tired but still need to proofread your document,what should you do?
    15·2 answers
  • What can a government use to determine your location at a specific time as long as you're using your mobile device
    6·1 answer
  • When you save a new file, you use the ______ dialog box to provide a filename and select a location of the file.
    9·1 answer
  • Contemporary pc operating systems and application software use a​ ________, which makes extensive use of​ icons, buttons,​ bars,
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!