1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
15

Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett

ings. b. Verify file sharing settings. c. Verify Windows Update settings. d. Verify that hard drives are being optimized weekly
Computers and Technology
1 answer:
spin [16.1K]3 years ago
7 0

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
You might be interested in
Is C++ a high-level or low-level programming language? What about HTML?
N76 [4]

Answer:

c++ is low level

html high level

Explanation:

6 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
A user has installed a mobile-device docking station on her Windows 2000 Professional computer. When the user rebooted the compu
Temka [501]
The startup mode you would use is Safe Mode. To get to safe mode, you have to hit f8 repeatedly, and there is 3 options for safe mode. You should find a option "Safe Mode with networking". Hit that, and you should be able to boot up your computer. I hope this helped you! :D
3 0
3 years ago
You have created shared folders for all your companies departments and assigned the appropriate permissions. everyone can access
larisa86 [58]
I would suggest the use of a disk quota.

Using a disk quota would limit the available space that users could have used to store data. The New Technology File system (NTFS) has several features like disk quotas to see which users are uploading the most space.  The windows interface Open Computer Management is also another option that limits the number of users of a shared folder.



8 0
4 years ago
compare the use and style of business letters and electronic communicstion, such as e-mail or secure messaging within the emr.
RSB [31]

Answer:

Some of the differences that can be found in this communication means are: the time of reception and response, impression methods, presentation, resources invested, environmental impact.

Explanation:

In today's world it is possible to have endless possibilities in terms of the means of communication through which we can send a message effectively. In the past before the technological era that we are living at the moment, the most common form of communication was the business letters that were normally constituted in a very formal way since its writing, its impression, the way in which it was physically distributed its information, its envelope and the time of diffusion also had to be a little more extensive.

Now according to the technological advances and all the benefits that technology offers us, e-mail is the most efficient form of communication even for companies, who have been able to adapt satisfactorily the characteristics of the messages contained therein in order to achieve a formal communication in the same way and transmit the message in a much faster and more effective way, without having to spend on prints, luxurious envelopes and the sending of the physical document and can also leave a record of the sending of the information. In addition the e-mail can not only be used for formal communications but for any type of communication that is necessary, almost immediately and very effectively, with a low impact in the environment with less use of paper.

6 0
4 years ago
Other questions:
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • You are evaluating the bounce rate of your overall website traffic and find that users with a social media referral source have
    9·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    7·1 answer
  • Consider a Games Expo for Children. Six competitions are laid out for the expo. Tickets are sold according to the age and gender
    11·1 answer
  • The following equations estimate the calories burned when exercising (source): Men: Calories = ( (Age x 0.2017) — (Weight x 0.09
    11·1 answer
  • Describe five different ways databases can be processed
    14·1 answer
  • Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use
    12·1 answer
  • Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
    7·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • When you save something to the Desktop on a school computer, what drive letter will it save to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!