A closed operating system allows

A) Modifications by anyone who finds it on his/her PC
B) Modifications by anyone who distributes it
C) Modifications only by those designated by the developer
D) Modifications to the open source of the designer


C

Computer Science & Information Technology

You might also like to view...

Which of the following threats must financial institutions address?

A) Denial of service B) Unauthorized access C) Malware D) All of the above

Computer Science & Information Technology

A number assigned to expansion adapters or ports so that the CPU can prioritize between two (or more) devices that need attention is a(n)

A) IRQ B) I/O address C) DMA channel D) USB enabler

Computer Science & Information Technology

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

A. RAT B. PUP C. Evil Twin D. Adware

Computer Science & Information Technology

To convert the color pictures in a photo album to black and white, click the ____ check box.

A. Change ALL to black and white B. Modify ALL as black and white C. Update ALL pictures to black and white D. ALL pictures black and white

Computer Science & Information Technology