1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
15

Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett

ings. b. Verify file sharing settings. c. Verify Windows Update settings. d. Verify that hard drives are being optimized weekly
Computers and Technology
1 answer:
spin [16.1K]3 years ago
7 0

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
You might be interested in
Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
aalyn [17]
The best is bus or walking
4 0
3 years ago
Car batteries have two terminals which are (blank).
Bumek [7]

Answer:

a positive and negative

3 0
3 years ago
Read 2 more answers
Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
Lina20 [59]

Answer:

CIDR is based on a variable-length subnet masking technique, which allows a new method of representation for IP addresses. Routing prefix is written with a suffix number of bits of the name, such as 123.0.0.0/8, as the CIDR network has the smallest possible amount of hosts.

Explanation:

CIDR ( Class Inter-Domain Routing ) It is a method that is allocating IP addresses and routing the IP. CIDR is introduced in 1933 and replace the architecture of network design on the internet. CIDR slows down the growth of the routing across the web and helps to slow the IP addresses such as IPv4 addresses.

CIDR consists of two groups of bits in the address. In the new age, the network prefix identifies the whole network. This is used as the basis of routing between IP networks and allocation policies.

IPv4 in-network prefix is 8-bit groups.

A typical IPv4 address is 192.168.0.5 the lowest value is 0, and the highest value is 255

In the given choices, 123.0.0.0 / 8 of the possible smallest number of hosts.

8 0
3 years ago
A company is looking for an employee to design and test connections in its
kolbaska11 [484]

The employee that design and test connections in its computer systems is in the computer architecture field.

<h3>What is design and test connections?</h3>

This is known to be a field in computer system where system engineers makes a lot of computer designs and also involve in testing of connections such as internet connections, etc.

Note that The employee that design and test connections in its computer systems is in the computer architecture field and they are known to be Computer software engineers

Learn more about  Computer jobs from

brainly.com/question/24588527

#SPJ1

8 0
1 year ago
Find different between manocots and dicots clarify with example​
Fantom [35]

Answer:

hope it's help you..............

7 0
3 years ago
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • In general, font size for software-generated presentation slides should be no smaller than __________ points.
    8·1 answer
  • What are the three types of programming design?
    15·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and remo
    10·1 answer
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • dash is a set of communication standard using for transferring file information between computers in a network​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!