1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
15

Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett

ings. b. Verify file sharing settings. c. Verify Windows Update settings. d. Verify that hard drives are being optimized weekly
Computers and Technology
1 answer:
spin [16.1K]3 years ago
7 0

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
You might be interested in
Ryan needs to see the space available to insert content on a slide in his presentation. Which feature of a presentation program
Sav [38]

The feature that Ryan should take advantage is Layout, which is available in his presentation, to insert the content he wants, be it a graph, picture, paragraph, bullet points, video, etc. Assuming this is a Microsoft PowerPoint, Ryan can right-click the slide he wants to put the content in, where an option window would appear. He should click on the ‘Layout’ option and several types of layouts available for him to put content on would appear: Title & Content, Two Content, Comparison, and Content with Caption.

3 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
The domain is the part of an internet address that refers to a group of computers on a network. true or false.
DENIUS [597]
The answer to this is true
3 0
3 years ago
Explain the unique reason why assember language is perfered to high level language
Zigmanuir [339]

The unique reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

<h3>Why is assembly language better than other kinds of high level?</h3>

It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.

Note that it is one that has a lot of  better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.

Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.

Hence, The unique reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

Learn more about assembler language from

brainly.com/question/13171889

#SPJ1

3 0
2 years ago
Find the error in the following pseudocode.
AnnZ [28]

Answer:

there is a song about a hundred digits of pieeee

Explanation:

4 0
3 years ago
Other questions:
  • You have implemented nap with dhcp enforcement, so you need to ensure you have an updated anti-virus software package, an update
    7·1 answer
  • ​________ is the scientific​ collection, examination,​ authentication, preservation, and analysis of data held on or retrieved f
    15·1 answer
  • ¿Qué 3 objetos son productos tecnológicos?
    9·1 answer
  • Assume each student is assigned an advisor from a department. Each classroom is assigned a classroom (class# determines Classroo
    14·1 answer
  • SHOW ME SOME C++ TUTORIALS?
    10·1 answer
  • Plz answer me will mark as brainliest ​
    8·1 answer
  • Which of the following statements best represents the impact vaudeville had on the film industry? Early silent films were more r
    14·1 answer
  • Bitmap images are ________ into different software applications.
    9·1 answer
  • Help teacher said with complete explanation ​
    5·1 answer
  • What is a valid response when identity theft occurs
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!