Match each operating system drawback to its respective operating system.

1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System

Answers

Answer 1

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

Answer 2

Answer:

1. Microsoft Windows is more susceptible to viruses

2. Mac OS X (Apple OS) has fewer compatible applications

3. Linux OS has a limited support system.


Related Questions

The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)

Answers

Answer: Hazardous

Explanation: Hazardous materials should be kept somewhere safe.

Answer:

i believe it would be dangerious

Explanation:

PLEASE HELP WILL GIVE BRAINLIEST

Answers

Answer:

Explanation: answer is b) the row comes first  in the  element of an index

Software is:

A. storage-related information technology.

B. programs that help hardware accomplish tasks.

C. the opposite of firmware.

D. all of the above.

Answers

I think the answer is A

Multitasking systems _____.

are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers

Answers

Answer: Multitasking systems are able to execute multiple jobs at the same time, hence the name "multitasking systems".

What is one difference between low- and high-level programming languages? (5 points)
O a
Ob
Low-level programming languages are challenging for humans to read, while high-level programming languages are easier.
Low-level programming languages are more human-friendly, while high-level programming languages are more challenging for
humans to understand.
Ос
Low-level programming languages require interpreters and compilers, while high-level programming languages do not.
Od
Low-level programming languages use program code to communicate with computers, while high-level programming languages
use machine code.

Answers

Answer: Low-level programming languages are computer code at its most basic. They are difficult or sometimes impossible for humans to read, while high-level languages are designed to be easy for humans to understand. I believe the answer is A.

Answer:

Low-level programming languages require interpreters and compilers, while high-level programming languages do not.

Explanation: I AM SURE IT IS CORRECT 100% CORRECT

n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals

Answers

The answer is (B. With bullet points) have a good day :)

100 points!! What should you click on to relocate broken link files?

A. search
B. Locate
C. Find
D. Browse

It’s not C

Answers

Answer:

im pretty sure its browse

Explanation:

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application

Answers

Answer:

The options for running a Windows 7 application on Windows 10 are;

1) Run the compatibility troubleshooter

2) Reinstall the app

Explanation:

The most recent version of Windows 10 supports the majority of applications made for versions of Windows before Windows 10, however, in the event that an application does not run on Windows 10 the options available for running the application are;

1) Run the compatibility troubleshooter as follows;

a) Type the application's name in the tax bar search box

b) In the menu showing the application that comes up, right click on the application's name and select the "Open file location option" from among the options menu

c) In the file location, locate and right click the program file which is the .EXE file and select "Properties" from the options menu. In the Properties dialogue box, select the "Compatibility mode"

d) In the "Compatibility mode" tab, select "Run compatibility troubleshooter"

2) Reinstall the app

a) With the app not yet installed on Windows, in the setup files location of the application, right-click the setup .MSI or .EXE application file

b) In the options menu select "Properties" and then the "Compatibility" tab in the "Properties" dialog box

c) On the Compatibility tab select the "Run this program in compatibility mode for" checkbox and select Windows 7 as your desired Windows

d) Click Ok.

Graphics created within Illustrator CC are always vector graphics true or false

Answers

True we use illustrator to draw vectors and vectors only

why? they are infinitely  scalable

Hope this helps.

-scav

High-level programming languages are (5 points)
O a
closer to human languages
Ob
less time consuming to run
ос
much more in control over the hardware
Od
similar to native machine code

Answers

The answer is A. Closer to human languages

Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.

Answers

Answer:

Alan is a Maintenance Supervisor.

Explanation:

Answer:

printing plant manager

Explanation:

In which phase of website design does the designer create a mock-up aimed at the target user? A. learning B. planning C. design D. development E. testing and delivering

Answers

Answer:

C. design

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.

In the design phase of a website design, the website designer create a mock-up aimed at the target user. A mock-up is a graphical representation or illustration of a graphic design and as such isn't responsive.

This ultimately implies that, a mock-up or model can be used by a website designer to illustrate or show the target user the look and feel of a website, so as to help these users have a better understanding of the specific elements and structure associated with it.

What is the danger of open-source software when it comes to military robotics?

Answers

Answer:

The issue with open source software is that it is usable (and editable) by anyone. When it comes to military robotics, the software that is used to run the robots must remain confidential. If it is not, anyone could take the software that the military is using to make their robots function and replicate it, which could be extremely dangerous.

Explanation:

Open source software is available to the general public.

Feel free to copy and paste this or put it into your own wording. Have a nice day!

A laptop has an Nvme drive (C:) and a mechanical hard drive (D:), when the user notice that the D: drive is not there.
what should the technician do to see if the drive is recognized by the OS?

Answers

Answer:

Explanation:

The user should type in the search bar at the bottom right of the taskbar the following keywords, Create and format hard disk partitions and click on the option that appears with the same name. This will open Disk Management which will give information on all of the different storage options that the computer has installed. If the OS is detecting and recognizing the drive it will appear here. Many times the drive does not appear because it does not have a drive letter assigned to it. This can be assigned to the drive from the Disk Management.

Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False

Answers

Answer:

True

Explanation:

True,My good sir/maam

Is a dot matrix printer an impact or non-impact printer

Answers

i think a non impact printer

Answer:

Impact

Explanation:

Briefly explain the main difference between how to connect a new office computer in the SHSS office to the internet and how to connect a standalone computer in your house to the internet

Answers

Answer:

Once you've set up your computer, you may want to purchase home Internet access, up a home wireless network, commonly known as Wi-Fi, so you can connect multiple. Now that you know about the different types of Internet service, you can do. The primary piece of hardware you need is a modem.

Which command tells the for loop what to count by?
a. step
b. range
c. count
b. variable​

Answers

step is the answer. or option A

Answer:

A) Step

Explanation:

the main work area of the computer is the

Answers

Answer:

Desktop

Explanation:

The desktop is the main work area of your computer, and will likely be the most visited area of your computer. Your desktop appears every time you log into your account, and contains icons and shortcuts to your most used programs and files.

Computer programmers must be fluent in every programming language. (5 points)
O True
O False

Answers

Answer:

False, its true that they need to know some programming languages but they do not need to be fluent in all of them.

plzzz help i need this today :(

Answers

Answer:

C

Explanation:

Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.

Answers

The question is incomplete. The complete question is :

Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.

combustion reaction , photosynthesis , respiration

water + carbon dioxide + sunlight → oxygen + glucose

methane + oxygen → water + carbon dioxide + heat

glucose + oxygen → carbon dioxide + water + energy

Solution :

The chemical reactions that is occurring in the following chemical equations are :

Photosynthesis

water + carbon dioxide + sunlight → oxygen + glucose

Plants uses the light energy from the sun in the presence of water and carbon dioxide produces food by the process of photosynthesis. It produces glucose and oxygen.

Respiration

glucose + oxygen → carbon dioxide + water + energy

The cellular respiration process produces ATP with the breakdown of the glucose and oxygen. During respiration process, carbon dioxide is obtained along with water and energy.

Combustion reaction

methane + oxygen → water + carbon dioxide + heat

Combustion reaction is a chemical reaction in which methane is the main ingredient. Combustion takes place as things burn in the presence to methane and oxygen to form carbon dioxide, water and heat.

You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem

Answers

Answer: Configure port security on the switch

Explanation:

Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.

When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.

Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso

Answers

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

images that are made up of pixels and cannot be resized without losing quality?

Answers

Answer:

there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.

Explanation:

hope this helps!

~evita

A computer is set up to copy DVDs overnight and have them ready the next morning when employees come into work. This would be an example of _____.

buffering
link-loading
multitasking
batch processing

Answers

Answer:

batch procressing

Explanation:

This is when something is scheduled to be done.

In this example, the computer is scheduled to copy DVD's and have them ready the next morning.

essence of radio program​

Answers

Answer:

Radio has the ability to reach across borders and can become a valuable source of information where reliable news is scarce. Radio has proved its worth in times of emergency such as when access to the mobile network is down as a result of an overload, or phone lines are cut.

Explanation:

top secret mission lolz

Answers

Answer:

whats the mission about??

Explanation:

~evita

Complete the sentence with the correct response.

The central core of an operating system is called the .

Answers

Answer:

Kernel

Explanation:

The Kernel is the program that constitutes the central core of the operating system kernel is the first part of operating system to load into memory during booting kernel is made of various modules which can not be loaded in running operating system kernel remains in the memory during the entire computer session

Which of the following is a programming language that translates code one line at a time? (5 points)
a
C:
b
Java
с
Machine
d
Python

Answers

Answer:

Python!

Its the only programming language that is an interpreted language

Hope it helped <3

Other Questions
Which of the following conflicts directly led to a written code of laws in Ancient Rome?A:the plebeians revoltsB:the Punic WarsC:the Persian WarsD:the Gallic Wars The hammerhead shark can reproduce both sexually and asexually. What characteristic of the offspring would suggest that they were producedthrough sexual reproduction? Offspring are-all the same gender.genetically diverse.produced in small number.produced very slowly. If You show all your work in these problems i will love you and give you brainliest natural selection vs artificial is -0.4 a rational number? 3/9=X/27 Solve for X Please help me! I will give you a brainliest!The Kansas Relief Committee appealed to the government, churches, and individuals to provide assistance to the starving people of Kansas. When a disaster hits a community, it is common to begin relief efforts. It has long been debated whether the government should assist its citizens when a disaster strikes or if relief should be provided by private organizations and individual donations.1. What do you think? 2. Who should help the people in need? help needed asap will give brainliest plss help me in this question Plz settle this arguement0/10 which is the best? 9/166 in fraction from? In 1-2 paragraphs, please explain the value of teamwork - BRAINLIEST ANSWER- Immediately before you provide feedback during the listening process you must What is the last step in the lawmaking process? The Senate has to approve it. The president has to sign it. The people have to vote on it. The legislature has to veto it. Which of the following choices contributed to the other three a. Japan emphasized manufacturing and foreign tradeb. Japan became more densely populated c. Japan's population nearly doubled between 1872 and 1925d. Japan seized more land in mainland Asia simplify. i need help with this Each node, or intersection, on a cladogram represents a/n _______ between two species. Identify the appositive phrase highlighted in the passage.A. - 'in New Mexico8. water's freezing pointc. who explored the cave long ago why did the major strikes of the late 1800s lead to black lash against labor unions? Which sentence contains a comma splice?O I don't know how he does it, but my dad is always the first one to catch a fish.I received a letter from my sister, I can't wait to read it!Although some people like to make hot chocolate with milk, I prefer to make it with water.When I got back from vacation, I had two hundred unread e-mails!