A trusted system is a system that can be expected to meet user requirements for reliability, security, and effectiveness because of what? a) Frequent updates b) Regular maintenance c) Built-in redundancies d) Vendor support

Answers

Answer 1
Answer: c) Built-in redundancies

Related Questions

There is only one way to change line spacing in Word.a. True b. False Mark this and return Next
Hi! Is anyone really good at making pretty schedules and designs? I don't have any money, but I could give points. I'll give a small number of points on this answer, but if you make the schedule I'll give you lots of points! (I'll send you the actual parts of the schedule I just need someone to make it look pretty) Thank you so much!
Analyzes the performance of hardware and software interfaces and identifies alternatives for optimizing the usage of computer resources.?
Are bpos safe for organisations ? State your views on it
To save a presentation, tap or click the save button on the Blank

________ software is a collection of programs that helps the computer manage its own resources and enables application software to interact with computer hardware.

Answers

Answer:

Operating System.

Explanation:

Operating system (OS) is a software that sits between applications and underlying hardware.

One of OS's main job is to manage hardware resources, and keep a certain balance so that the end-user never experience any major slowdown or freeze while using the system.

For an application to access system hardware, it needs to use the SDK provided by the OS manufacturer. By developing applications through SDK, its developer conforms to what the OS requires for an application to run properly.

Why would a team choose to employ a zone defense over a person to person defense?

Answers

Answer/Explanation:

Zone defense is chosen if MULTIPLE people are attacking one spot that's why they would choose zone defense.

Person to person defense is when 1 person is attacking one spot so somebodies sent out to defend it.

~ LadyBrain

Which of the following is a disadvantage of notebook systems?

Answers

The disadvantage of notebook systems is that it is difficult to replace the battery. Hence, Option C is correct.

Ask about the disadvantage of notebook systems.

Now we know that;

Notebook systems, colloquially called laptops, often have internal batteries that are not easily replaceable by the user.

This means that if the battery loses capacity over time or becomes defective, it can be difficult to replace without professional help or contact the manufacturer.

Therefore, Option C is true.

Read more on software here:

brainly.com/question/25703767

#SPJ3

The correct question is :

Which of the following is a disadvantage of notebook systems?

A. They require AC power

B. They are more expensive

C. The batter is difficult to replace

D. Productivity apps are difficult to use

What are the options ?

Which term describes the order of arrangement of files and folders on a computer?

Answers

Organization, or if you are reversing the sequence, you would break into what are called trees they look like this

Computer
/ \
Videos Pictures
\
Album

so trees, tree groups. Or if you are looking for a pattern: Size, Alphabatized, Date last accessed Etc.

If a big truck in front of your car begins to turn left, but its right turn signals are flashing, it is most likely that truck driver __________________.

Answers

It is most likely that the truck driver is preparing for a right turn.

A large panel truck driver making a wrong right hand turn can cause what is commonly known as a right hand accident. This would result into a crash from either the front or the side. It is worth noting that the bigger the vehicle, the bigger the area the truck needs to make a safe turn.
What this truck driver was trying to do is called the “jug handle” turn. His aim was to turn left first so he can get out around the corner with a wider clearance to avoid hitting anyone else on traffic. Whoever is behind would be able to stop, slow down and wait for him to negotiate the turn

If privileges are greater than those already available to the attacker the result is a _________.

Answers

Answer:

privilege escalation

Final answer:

When an attacker gains privileges greater than what they already have, it's called privilege escalation. Both vertical (becoming a superuser) and horizontal (getting privileges of a peer) are serious security risks.

Explanation:

If privileges are greater than those already available to the attacker, the result is a privilege escalation. In terms of computer security, privilege escalation means that a user receives privileges they are not entitled to. These privileges can be used to delete files, view private information, or even take control of the system. It can occur in two ways: vertical privilege escalation, also known as becoming the superuser, whereby a user can get rights reserved for a user with higher privileges. Horizontal privilege escalation, on the other hand, is when a user is able to acquire the same privileges as another user. In both cases, it represents a serious security risk.

Learn more about Privilege Escalation here:

brainly.com/question/34644252

#SPJ11