1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
15

Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett

ings. b. Verify file sharing settings. c. Verify Windows Update settings. d. Verify that hard drives are being optimized weekly
Computers and Technology
1 answer:
spin [16.1K]3 years ago
7 0

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
You might be interested in
For this question you must write a java class called Rectangle and a client class called RectangleClient. The partial Rectangle
polet [3.4K]

Answer:

Java.

Explanation:

public class Rectangle {

   private int x;

   private int y;

   private int width;

   private int height;

   ///////////////////////////////////////////////////////////

   public Rectangle(int inX, inY, inWidth, inHeight) {

       x = inX;

       y = inY;

       width = inWidth;

       height = inHeight;

   }

   ///////////////////////////////////////////////////////////

   public int getX() {

       return x;

   }

   public int getY() {

       return y;

   }

   

   public int getWidth() {

       return width;

   }

   public int getHeight() {

       return height;

   }

   ///////////////////////////////////////////////////////////

   public int getArea() {

       return width * height;

   }

   public bool isSquare() {

       if (width == height) {

           return true;

       }

       else

           return false;

   }

   ///////////////////////////////////////////////////////////

   public String toString() {

       return "Rectangle located at (" + x + "," + y + ")" + "with dimensions " + width + "x" + height + "and " + getArea() + "is the area.";

   }

}

8 0
3 years ago
Free Write Friday 2/26/21
Bad White [126]
Write about art bc thags always so cool
4 0
3 years ago
A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed
hjlf

Answer: you want to list all LC structers

Explanation:

4 0
4 years ago
Which of the following helps create a positive community?
Lera25 [3.4K]

Answer: D.) all of the above

Explanation: By doing all three of these it makes almost everyone in the community is happier and more positive which is better than the bully's & people who don't speak up feel less entitled, it achieves the goal.

5 0
3 years ago
Which option ensures that page break is automatically inserted ahead of a specific paragraph or heading?
xxTIMURxx [149]

Answer:

The "Page breaks before" option is the correct approach.

Explanation:

  • This attribute specifies whether such a page interruption could perhaps appear just before any component to something which applies.
  • This says that you would like this particular section to succeed at the beginning of that same page, irrespective of what it's about, they are being used for paged multimedia, for example, printed publications and otherwise texts or paperwork.
7 0
3 years ago
Other questions:
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • What is the most important part of the course that you have learned about so far?
    11·2 answers
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • Unlocking your smart phone remote security protections that protect your mobile device from meniscus applications
    5·1 answer
  • The thinner the thread on the screw, the ______the force needed but the _____the distance.
    15·1 answer
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    8·2 answers
  • 1. The Bank manager is imposing a 10% interest rate on the new salary loan to every account in the BPI Family Bank. (ANSWER SHOU
    15·1 answer
  • Explanation historical development of computer ​
    10·1 answer
  • Whats th diffence between a fwireless speaker and a wird speakr
    12·1 answer
  • Which programming paradigm focuses on abstraction to the level of math and the elimination of side-effects and state based progr
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!