1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
7

Security Definition updates for windows defender are performed through the ——— function in windows server 2016

Computers and Technology
2 answers:
Crazy boy [7]3 years ago
8 0

Security Definition updates for windows defender are performed through the function in windows server 2016 by two methods (Preferable method 1)

<u>Explanation:</u>

Method 1:

  • By opening windows defender and select security tab Virus & threat protection tile and select protection status.
  • After selecting protection status and click check for update and download.

Method 2:

  • Through settings by selecting windows update end user can check for windows update.
  • Through windows update system will automatically check windows defender update virus definition and download the update accordingly.
inysia [295]3 years ago
7 0

Answer:

Windows Update

Explanation:

You might be interested in
What does CS mean? idk
Rainbow [258]
Computer science or computer software
3 0
3 years ago
Read 2 more answers
Which of the following cannot be used in MS Office.<br> Joystick<br> Scanner<br> Light Pen<br> Mouse
ValentinkaMS [17]

Answer:

A.

Explanation:

A Joystick is a control device that is connected to the computer to play games. A joystick is similar in structure to a control stick used by pilots in airplanes and got its name from the same. A joystick contains a stick, base, extra buttons, auto switch fire, trigger, throttle, POV hat, and a suction cup. A joystick also serves the purpose of assistive technology.

The device which can not be used in MS Office is a joystick. Therefore, option A is correct.

6 0
3 years ago
Which peripheral device is used to record sound?
faust18 [17]

he will need a microphone, it is a recording device.

8 0
3 years ago
Read 2 more answers
a problem exists when the current condition differs from a desired condition. This idea defines which step in problem-solving?
zhannawk [14.2K]

In algorithm the idea defines a decision box

5 0
3 years ago
Read 2 more answers
Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(
agasfer [191]

Answer:

The program to this question can be given as:

Program:

#include <stdio.h>  //include header files

#include<math.h>

int main()    //main method  

{        

   double treeHeight = 0.0;         //declare variables

and assign value

   double shadowLength = 0.0;  

   double angleElevation =  0.11693706;

   // (0.11693706 radians = 6.7 degrees) convert number into angle.      

   shadowLength = 17.5;  

treeHeight = shadowLength * tan(angleElevation);   //convert number into angle

   printf("Tree height: %lf\n", treeHeight);   //print value.

   return 0;  

}

Output:

Tree height: 2.055778

Explanation:

In the above C language program firstly we include the headers. In this header file, we include a (math.h) header file this file helps to use the math function. Then we declare the main method in the main method we declare the variable that is given in the question that are treeHeight, shadowLength , angleElevation. All the variable datatype is double because it stores the floating-point value. Then we apply the formula that is  treeHeight = shadowLength * tan(angleElevation). In this formula, the treeHeight variable holds the value. Then we print the variable value for print the double value we use the lf(that is long float).

7 0
4 years ago
Other questions:
  • Here's something to stop you from getting repetitive when writing essays. Write a program that reads multiple lines of plain tex
    15·1 answer
  • Typically, a dvd has how many times more capacity than a cd?
    5·1 answer
  • A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
    11·1 answer
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • Tortise and hare race java g Modify the main class so it runs the race 100 times and reports how many times each runner wins. (T
    7·1 answer
  • Which type of optical scanner works in a manner similar to a copy machine?
    15·1 answer
  • in java how do i Write a program that reads a set of integers, and then prints the sum of the even and odd integers.
    6·1 answer
  • Disk ____ is the ability to spread data over multiple disks or volumes
    7·1 answer
  • You can align controls in the report design window using the align button on the report design tools ____ tab.
    8·1 answer
  • Ali has created a small program in Python, but he wants to store his data in a multi-dimensional array. He would like to use adv
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!