1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
6

Importancia del sistema operativo

Computers and Technology
1 answer:
love history [14]3 years ago
7 0

Answer:

Un sistema operativo es el software más importante de tu computador, ya que se encarga de gestionar el hardware, el acceso a la memoria, acceso a la CPU y controlar gran parte de las tareas que lleva a cabo tu computador.

You might be interested in
An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
Yuri [45]

Answer:

Rule based automation

Explanation:

8 0
3 years ago
What is the definition of phishing with an example
Diano4ka-milaya [45]
Phishing is an ability of fraudulently obtaining personal info.
synonyms: Fraud and scam
8 0
3 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Mypiecewise(a,b,c) which takes three inputs:
Step2247 [10]

Answer:

function result = mypiecewise(a, b, c)

   if(c==0)

       result=5(a+b);

   elseif(c>0)

       result=(a*b=c);

   else

       result=-7;

   end

end

Explanation:

It is done in matlab.

6 0
3 years ago
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • Windows server 2012 r2 supports two types of folder shares. what are those two types?
    6·1 answer
  • This isn't school wise but like.. I can't log into IMessage so I decided to try and log into FaceTime but thats not working. Cau
    7·1 answer
  • What are the disadvantages of plasma display?
    9·1 answer
  • What is nominal data?
    5·1 answer
  • You just bought a new hard drive for your computer to replace your primary hard drive. After backing your data up and, then, ins
    8·2 answers
  • An option already selected by windows is called____ ( default option/ default selection)​.
    6·1 answer
  • What is MS Paint ?<br>Computer <br>short answer​
    14·2 answers
  • BRAINLIEST TO RIGHT ANSWER!! TIMED QUIZ HELP ASAP PLS!!
    5·1 answer
  • Five varieties of software​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!