1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
4 years ago
15

Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?

Computers and Technology
1 answer:
FinnZ [79.3K]4 years ago
3 0
<span>The paging file size should be set to the default setting at all times. This setting is meant to have the system manage the paging file size as this allows more virtual memory to be backed.</span>
You might be interested in
If I bought mine craft p.e. for 7.99 and hook my Micro soft account up, will i get java edition
katrin [286]
No, they are two diff things
5 0
2 years ago
12. Why is it so important to pay attention to your digital reputation?
natita [175]

Answer:

B.) It can seriously affect your future career and educational goals.

I hope this helps! ^-^

3 0
2 years ago
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
Which of the following statements are not true about TCP? (Multiple answers)
Usimov [2.4K]

Answer: (C) The uses the silly window mechanism to provide flow control

Explanation:

 TCP stands for the transmission control protocol which is basically used to provide the communication by interconnecting different types of devices over the internet. TCP is the connection oriented network protocol.

In the transmission control protocol, the silly window is the type of syndrome in the computer networking that majorly caused by the poor TCP flow control in the networking system. It is basically reduce the incoming and amount of the data due to this problem.

The above statement is false, as it does not provide any flow control in the transmission control protocol.

3 0
4 years ago
A program that organizes sequences of automated provisioning tasks. A. Application Packager B. Sequence Manager C. Sequence Logg
love history [14]

Answer:

Application Packager B. Sequence Manager C. Sequence Logger D. Management Loade … r When a NIC reads a packet header and sees the destination address is not its own

Explanation:

Application Packager B. Sequence Manager C. Sequence Logger D. Management Loade … r When a NIC reads a packet header and sees the destination address is not its own

6 0
2 years ago
Other questions:
  • Which method of encryption is based on physics principles?
    5·1 answer
  • Hich chip contains the information necessary to start the computer system?
    11·1 answer
  • If someone receives a shock, or a piece of equipment is throwing sparks or arcing you should try to pull them away from the sour
    7·1 answer
  • The Internet began when a large company wanted to sell products online. True False
    15·2 answers
  • Help me please............
    6·2 answers
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • In the following data definition, assume that List2 begins at offset 2000h. What is the offset of the third value (5)?
    10·1 answer
  • Next, Jamal wants to copy text from a Word document to the slide he just added. He outlines the steps to complete his task. Step
    15·2 answers
  • Display all the lines in unixPasswd that contain at least 10 consecutive lowercase letters. How many names are there in total th
    12·1 answer
  • What technological development happened most recently?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!