1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
15

Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett

ings. b. Verify file sharing settings. c. Verify Windows Update settings. d. Verify that hard drives are being optimized weekly
Computers and Technology
1 answer:
spin [16.1K]3 years ago
7 0

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
You might be interested in
"Margaret has $3,200 cash after selling off her television, DVD player, and computer. She has debts of $4,800 owing to the follo
serg [7]

Answer: Hyatt's  will be able to collect $1,365

Explanation: Composition Agreement is a kind of agreement reached between a debtor and its creditors. it a kind of agreement whereby the debtor and creditors agree to collect a percentage of their debts to fully settle their debts from the creditor.

For instance Margaret with a cash of $3,200 to settle a debt of $4,800.

In this case Margaret can decide to pay 65% of the total debts to settle the final debts. Here, Hyatt's  will be able to collect $1,365 as full settle of his debt.

5 0
3 years ago
In the ____ category, the cloud service provider offers the capability to build and deploy consumer-created applications using t
Nikolay [14]

Answer:

Platform as a Service (PaaS)

Explanation:

In cloud computing, PaaS called platform as a service refers to the provision of a computing platform for developers to create their own custom application. Other two categories of cloud computing are IaaS (Infrastructure as a service) and SaaS (Software as a Service). In the PaaS the servers, cloud storage and network  are automatically handled by the platform only the software and application code are to be managed.

7 0
3 years ago
You have just taken over management of a server on which the previous server administrator has set up several server components,
Arisa [49]

Answer:

d. Ensure file caching and flushing are enabled for all disk drives.

Explanation:

When the disk reading and writing is delayed and the server performance is also slow after taking over management of a server.Previously the server has several server components.So to increase the performance we should ensure caching of the file and make sure that the flushing is enabled for all disk drives.Hence the answer to this question is option d.

8 0
3 years ago
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
In excel, combining two or more selected cells into one cell is called ____ cells
n200080 [17]
The answer that would best complete the given statement above would be the word "MERGING". So here is the complete statement. <span>In excel, combining two or more selected cells into one cell is called MERGING cells. Hope this answers your question. Have a great day!</span>
4 0
4 years ago
Other questions:
  • What information is kept in the cached lookups folder for a dns server?
    9·1 answer
  • What does cramming to hand in an assignment
    10·1 answer
  • How can you ensure that your web pages are compliant with a w3c standard?
    9·1 answer
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • ______________ in SONET are analogous to the ________________ of T-carriers.
    7·1 answer
  • Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit
    7·1 answer
  • John works as an associate at a construction company. His job is to draft contracts for suppliers. Before he prints the contract
    7·1 answer
  • What’s ur guys rank of all 3D Mario games (all of these are great games btw)? These are my opinions I’d rly enjoy hearing yours.
    8·1 answer
  • .A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!