Which is a function of an operating system?

a.Browse the Internet
b.Edit images
c.Protect against malware
d.Provide a user interface


D

Computer Science & Information Technology

You might also like to view...

The Hypervisor Clustering architecture relies on the use of heartbeat messages to determine whether a given hypervisor within a cluster is active and available.

a. True b. False

Computer Science & Information Technology

When you need to create a list of parallel information, you should use a(n) ________

A) numbered list B) outline C) bulleted list D) table

Computer Science & Information Technology

Which of the following kinds of cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating?

A. coaxial B. integrated C. twisted-pair D. fiber-optic

Computer Science & Information Technology

Matt, a security administrator, has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files, Matt should:

A. Require all visitors to the public web home page to create a username and password to view the pages in the website B. Configure the web application firewall to send a reset packet to the incoming IP from where an attack or scan signature has been detected. C. Create file hashes for website and critical system files, and compare the current file hashes to the baseline at regular time intervals. D. Reboot the web server and database server nightly after the backup has been completed.

Computer Science & Information Technology