cises t Answer Questions 1. What is Open source Operating System? Write the advantages and disadvantages of Open source Operating System.​

Answers

Answer 1

Answer:

Question 1. Open source operating system is an operating system that allow the public to view and edit the source codes on which the operating system is developed, and any user can have access to and edit the source code

Advantages of Open Source Operating System

a) Open-source operating system are usually free, or very low price

b) The open source operating system are constantly being evaluated globally by skilled users and developers that can get bugs fixed once they are detected

c) Open-source operating system can be customized

Disadvantages of Open Source Operating System

a) The free access to the source code increases the vulnerability of open-source operating system to attacks

b) Users are expected to have a certain level of technical proficiency to be able to use an open-source operating system

c) The open-source operating system comes without a customer support service

Explanation:


Related Questions

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

write the name of the technologies used in all five generation​

Answers

Answer:

First Generation (1940-1956)

First Generation (1940-1956)Second Generation (1956-1963)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)

Answer:

Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .

Explanation:

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

What is a single physical processor? plz help​

Answers

Answer:

A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.

Explanation:

What method is used to prevent the random number generator from always starting with the same number?

seed()

random()

randint()

initialize()

Answers

Answer:

seed()

Explanation:

Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.

Hope this helps!

Answer:

the answer is seed()

Explanation:

i took the assignment

Write the technical terms for each of the following:
a. The use of the Internet to buy and sell goods and services.
b. Voice communication through the Internet. C. A program that allows the user to log into a remote computer on the Internet as a user on that system.
d. High speed digital communication network evolving from existing telephony.
e. Software that is used for surfing information through the Internet.​

Answers

Explanation:

network" (and any subsequent words) was ignored because we limit queries to 32 words.

I need help creating a symmetric histogram. The program should ask the user to enter the number of bars to print and the character to use to draw the bars. The count of characters in the bar needs to be displayed on the right-side of each bar. You must use a nested loop to display the output.

Answers

Answer:

The program in Python is as follows:

import math

bars = int(input("Bars: "))

symbol = input("Character: ")

current = 1

while current < bars * 2:

   if current <= bars:

       num = current

       for i in range(num):

           print(symbol,end="")

       print(current)

   else:

       num = abs(bars * 2 - current);

       for i in range(num):

           print(symbol,end="")

       print(i+1)

   current+=1

   

Explanation:

This imports the math module

import math

This gets input for the number of bars

bars = int(input("Bars: "))

This gets input for the number of characters

symbol = input("Character: ")

This sets the current element to 1

current = 1

The following iteration is repeated until printing ends

while current < bars * 2:

The following checks for printing in ascending order

   if current <= bars:

       num = current

The following loop prints the characters in ascending order

       for i in range(num):

           print(symbol,end="")

This prints the number of characters

       print(current)

The following checks for printing in descending order

   else:

Calculate the number of iteration left

       num = abs(bars * 2 - current);

The following loop prints the characters in descending order

       for i in range(num):

           print(symbol,end="")

This prints the number of characters

       print(i+1)

   current+=1

 

describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation​

Answers

Answer:

Explanation:

Good organization, complete information and clear writing are the most effective ways to design a document.

I hope this helps

A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?

Answers

Answer:

I think the answer is 2.

hope it will help you

Because it contains an embedded space

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

which computer is used in hospital for ultrasound?​

Answers

Answer:

Pentium Powered Computer

Explanation:

Pentium powered computer

14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)

Answers

Answer:

Override

Explanation:

Hope this helps

very complex type of processing is carried out by a which computer​

Answers

Answer:

hope it helps you

Explanation:

Processing is the “work” being done, in a program. For example, if a program added up a series of a million different numbers in a file, and computed a total, then the computer would be said to be “processing”, during the time where the numbers were being accumulated into a total.

Interestingly though, a computer is also processing “all the time”, that is even when it is at rest. That is because the operating system, (and underlying hardware), are still doing things which can be referred to as processing as well.

For example, the time-clock in a computer is continually updating regardless if there is any other processing going on in a system. This would be termed OS (operating system) level processing

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

how do you take a screenshot on a Samsung tablet

Answers

Explanation:

to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds

what is computer graphics uses of computer graphics​

Answers

Answer:

The technology that deals with the design and pictures on computer is called computer graphics.

It is displaying art and image data effectively and meaningfully to the consumer.

It is also used for processing image data received from the physical world, such as photo and video content.

OUTPUT DEVICES 1. Match each output device on the left with the correct use on the right. Output device Use Multimedia A large monitor used by older computers Projector Used when checking the depth of water in a container Buzzer Used for outputting large posters, maps and plans Light A thin light weight monitor Wide format printer Used to make presentations to a large audience Dot matrix printer Used for producing mutli-part invoices CRT monitor Used as an alert on smartphones TFT/LCD monitor​

Answers

Answer:

hand

Explanation:

My name is Yoshikage Kira. I'm 33 years old. My house is in the northeast section of Morioh, where all the villas are, and I am not married. I work as an employee for the Kame Yu department stores, and I get home every day by 8 PM at the latest. I don't smoke, but I occasionally drink. I'm in bed by 11 PM, and make sure I get eight hours of sleep, no matter what. After having a glass of warm milk and doing about twenty minutes of stretches before going to bed, I usually have no problems sleeping until morning. Just like a baby, I wake up without any fatigue or stress in the morning. I was told there were no issues at my last check-up. I'm trying to explain that I'm a person who wishes to live a very quiet life. I take care not to trouble myself with any enemies, like winning and losing, that would cause me to lose sleep at night. That is how I deal with society, and I know that is what brings me happiness. Although, if I were to fight I wouldn't lose to anyone.

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use

Answers

Answer:

A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated,  organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file

Explanation:

A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer

Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format

Structured file are files that are keeps data in a uniform organized structural format

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

Rewrite the following using if else statement:
int x;
String s=(x%3=0)? “Divisible by 3" : "Not divisible by 3";
System.out.println(s);​

Answers

int x;
String s = “x%3=0?”
if( x%3 == 0){
s = “Divisible by 3”
}
else{
s = “Not divisible by 3”
}
System.out.println(s)

In the early 1900s, engineers introduced the first_____.

Answers

They introduced the first radio
The answer is: a0 radio.

In the early 1900s, engineers introduced the first “a0 radio”.

Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the information he is copying looks right, which option should he choose?

Use Destination theme
Picture
Keep text only
Insert same

Answers

idunnosorry


hope u have a good day

Answer: a

Explanation:

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:

A. Cung cấp nước, dinh dưỡng

B. Giữ cây đứng vững

C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững

D. Cung cấp nguồn lương thực

Answers

Answer:

C

Explanation:

Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?

queries
forms
procedures
subroutines

Answers

Answer:

subroutines

Explanation:

subroutines is used in access to locate and retrieve data

Which is not true about climatic normals?

Multiple choice question.

A)
They can differ from daily weather conditions.

B)
They are gathered at one location.

C)
They are averaged over a 30-year period.

D)
They describe average conditions.

Answers

Answer:

I think c is correct answer

Explanation:

hope it's help yu

Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)

Answers

Answer:

5 nautical mile

4000 feet

1200 feet

Explanation:

Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.

Other Questions
When the economy is severelydepressed, according to Keynesianism,which of the following is beingunderutilized?A. InflationB. ImportsC. TariffsD. Capital resources (land & labor) A stone is dropped into a lake, creating a circular ripple that travels outward at a speed of 60 cm/s. Find the rate at which the area within the circle is increasing after each of the following.after 2s : cm2/safter 5s : cm2/safter 6s : cm2/s How to find the inverse of this matrix[tex]\left[\begin{array}{ccc}1&0\\0&3\\\end{array}\right][/tex] Which word correctly completes the sentence?Esto est arriba de la cabeza y puede ser de diferentes colores.Es _____.la bocael cabelloel estmagolos dientes plz help asap!!!!!!! Help please............./.. he FAA restricts how much lithium to carry on an airplane. The rule-of-thumb is a battery has 0.3 g of lithium per Ampere-hour (Ah). A laptop battery is rated as 5 Ah per cell and contains 4 cells. Find the lithium content in grams. (compare with the FAA limit of 8 grams) What does the Giver mean when he says, Its the choosing thats important, isnt it? Calculate the mass of isoborneol in 2.5 mmol of isoborneol and the theoretical yield (in grams) of camphor from that amount of isoborneolisoborneol = 154.25 g mol?1Camphor, Molar mass = 152.23 g/mol Trong th nghim v s khc x nh sng, mt hc sinh ghi li trn tm ba ba ng truyn ca nh sng nh hnh bn nhng qun khng ghi chiu truyn.Tia khc x l When your tire blows out in the middle of a drive, you should A. let go of the steering wheel B. pump the brakes immediately C. grip the steering wheel firmly D. immediately steer to the side of the road The price of an item has been reduced by 70%. The original price was $30. What is the price of the item now? describe the process of digestion (20marks) The scatterplot shows the selling prices of homes and the square feet of living space.A graph titled home value has square feet (thousands) on the x-axis, and price (hundred thousand dollars) on the y-axis. Points are at (1.2, 1), (1.5, 1.1), (2, 1.5), (2.5, 2). An orange point is at (3.8, 3.9).Complete the statements based on the information provided.The scatterplot including only the blue data points shows a strong positive correlation. Including the orange data point at (3.8, 3.9) in the correlation would strengthen and increase the value of The coefficient of kinetic friction between an 100-kg desk and the wood floor is 0.4. What force (in Newtons) must be applied to move the desk at a constant speed? help now sort out electric current as fundamental or derived unit. Which sentence uses numbers correctly?O There were sixty-eight people at the party.O There were 68-people at the party.O There were sixty eight people at the party.There were 68 people at the party. gii h em cu THU ny ni v ng hay sai v gii thch , a ra li gii gip em , em cm n mi ngi DN nhp mt l hng vi s lng l 10.000sp A; theo gi FOB cng nc XK 1usd/sp. chi ph vn ti F v BHQT I phi tr bng 20% gi nhp ca l hng. t gi hi oi tnh thu 20.000 vn/usd. Thu sut TNK 20% (TNK c gim 20% s thu phi np) , TTTDB 15%, TGTGT 10%. TNK, TGTGT, TTTB phi np ca l hng A ny ln lc l : 38.400.000 ; 27.840.000; 45.936.000. 2. Why do scientists often use thermoacidophile group of archaebacteria for research? Jackie is the owner of a furniture store. Last year, her total revenue was $500,000 and her total labor costs were $200,000. Her overhead expenses, including insurance and legal fees, were $175,000. The rent on the building was $45,000. Jackie could earn $105,000 per year working at a nearby furniture distributor. From this information, we know that her accounting profit was