1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
2 years ago
6

Importancia del sistema operativo

Computers and Technology
1 answer:
love history [14]2 years ago
7 0

Answer:

Un sistema operativo es el software más importante de tu computador, ya que se encarga de gestionar el hardware, el acceso a la memoria, acceso a la CPU y controlar gran parte de las tareas que lleva a cabo tu computador.

You might be interested in
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
When you enforce restrictions, what must you do immediately?
sweet [91]
The answer is A create a password
4 0
3 years ago
Read 2 more answers
Which of the following is a category of authorization tools
Tpy6a [65]

Answer:

Cloud-Based eLearning Authoring Tools.Locally Hosted eLearning Authoring Tools. Multimedia eLearning Authoring Tools.PowerPoint Ribbon eLearning Authoring Tools.Screen Capturing And Recording eLearning Authoring Tools

Explanation:

Any software, or collection of software components, that authors can use to create or modify web content for use by other people, is an Authoring Tool.

5 0
3 years ago
You are the security administrator for your company. You have been informed by human resources that one of the employees in acco
andreyandreev [35.5K]

Answer:

The answer is "option d".

Explanation:

When an employee is fired so, their account should be closed, and the employee records should be maintained over a certain time specified by the rules and procedures of the company. and other options can be defined as:

  • In option a,  It is not important to delete the user account because later on, the company would need info about that account.
  • In option b, There's no need to talk to the superior of the employer.
  • In option c,  change the user password is not enough to update the user's password; the account should also be deleted.
5 0
3 years ago
The process that prepares a data model for implementation as a simple, nonredundant, flexible and adaptable database is known as
Vera_Pavlovna [14]

Answer:

The process that prepares a data model for implementation as a simple, nonredundant, flexible and adaptable database is known as

C) data analysis.

Explanation:

Data analysis is a process used in critically examining, evaluating data by using logical and statistical techniques.

Data analysis helps in the discovery of important information, data that can be used in the final decision making. the types of data analysis we have are:

*Prescriptive Analysis.

*Descriptive Analysis.

*Predictive Analysis.

*Diagnostic Analysis.

3 0
3 years ago
Read 2 more answers
Other questions:
  • The process of making raw materials into a finished product is known as
    14·2 answers
  • The ampacity of a No. 12 aluminum wire with RHW insulation installed in a raceway that has 19 other wires is
    15·1 answer
  • Keisha has been asked to give a presentation about a new method for processing customer returns. The first thing she should do i
    11·1 answer
  • If you see an icon in a document preset that looks like a tiny web browser window, what type of document is the preset meant to
    13·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • The expression 10,785(1.0275)x represents the amount of money in an investment account with interest that compounds annually for
    14·2 answers
  • Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, ma
    13·1 answer
  • Which of the following is not true about network design?Group of answer choicesIn designing LAN networks, network designers tend
    11·1 answer
  • In which area of the screen can features and functions of Word be accessed?
    9·2 answers
  • Choose all that apply.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!