1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
2 years ago
14

2. What are some other reasons why you might need to know the operating system version on your computer or mobile device

Computers and Technology
1 answer:
mote1985 [20]2 years ago
7 0
1. To check compatibility of an app/ software
2. To know the vulnerabilities
3. To be aware of available system updates
Hope that helps
You might be interested in
23+ Composition refers to
Law Incorporation [45]

Answer:

c. The placement and relationship of  elements within a picture

Explanation:

Required

What composition means?

Literally, composition means the way the elements of a picture are presented. The elements in this case constitute all lines, shapes, dots, pattern and many more.

You will notice that some of these elements will be placed over one another, some side by side, some far from one another.

So, composition means the way these elements are displayed.

<em>Hence, option (c) is correct.</em>

3 0
3 years ago
On what basis can you categorize the generations of computers
3241004551 [841]

what the answer to this question....


7 0
3 years ago
Which component, located on the motherboard, carries out all the instructions provided by computer programs? ram?
Blababa [14]
<span>The Chipset is the component located on the motherboard, this carries out all the instructions provided by computer programs. It is the integrated circuit that manages all the data flow between processor and memory. It usually works with microprocessors and plays a crucial role in determining system performance.</span>
6 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Which one is it A,B,C,D
Yakvenalex [24]

I am pretty sure A is the answer because it makes most sense plugged into the sentence.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    8·2 answers
  • How is the illusion of animation achieved using Sprites with multiple costumes?
    12·1 answer
  • python Write a program that will take a file named Celsius.dat that contains a list of temperatures in Celsius (one per line), a
    9·1 answer
  • Angle parking spaces are generally entered at an angle about __________ from the curb.
    8·2 answers
  • Which of the following is considered a skill?
    11·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • Pleasee telllllllllllllllllll​
    15·1 answer
  • What does the digital living network alliance standardize
    12·1 answer
  • 1. What is the difference between a group and a topic?
    10·1 answer
  • Mark just finished reading the cay and must write a book report comparing events in the book to events in his life. based on eac
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!