nikki3161 nikki3161
  • 02-07-2019
  • Computers and Technology
contestada

Are Microsoft an Apple more secure from malicious action because of their closed-source approach?

Respuesta :

aarongisme
aarongisme aarongisme
  • 02-07-2019

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

Answer Link

Otras preguntas

Given that (8,7) is on the graph of f(x), find the corresponding point for the function f(x)+4 Hurry ! I need help
B(n)=2^n A binary code word of length n is a string of 0's and 1's with n digits. For example, 1001 is a binary code word of length 4. The number of binary code
What culture flourished on the Greek mainland in the Late Bronze Age, and what was this period viewed as by the Greeks?
determine the mass densiry (kg/m3) if 1911 pounds of a substance has a volume of 33.6 gallons
Graph the rational function f (x)=- 3x + 1 -x+2
The straight line PQ with a gradient -2 passing through point (-3, 10). Find the y-intercept of the straight line PQ . Please help me and explain it . Thank you
Which of the following did the Treaty of Versailles NOT do to Germany? A. Imposed enormous reparation payments B. Put foreign leaders in charge of Germany’s Par
(07.01 MC) Find the cosine ratio of angle Θ. Hint: Use the slash symbol ( / ) to represent the fraction bar, and enter the fraction with no spaces.
Hanna is a supervisor in the production unit of a textile company. Yosef, who is of Jewish origin, joins her unit as a trainee. Hanna overcriticizes him for min
6th grade math help me, please :))