1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
11

Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma

lware detection software
Computers and Technology
1 answer:
Shalnov [3]3 years ago
4 0

Answer:There are several software products and settings you can make that will help alert you to or protect you from certain kinds of technology attacks such as malware, viruses, and so on.   Use these programs and keep them up to date so they can defend you against the latest threats.

Explanation:

You might be interested in
The two main methods of verification
Firdavs [7]

Answer:

data check and double entry

Explanation:

Inputs have to be validated before allowing any kind of processing or operations to be performed on it. This is extremely important because , an unhandled wrong input might have the complete ability to crash a system. C++ has some good validation techniques that can be used to validate most kind of inputs. This post discusses some of the techniques and its shortcomings and what could be done to improve the quality of validation.

5 0
4 years ago
Ben is accessing his bank account using online banking. What protocol in the URL lets him know that the website is secure and en
Pepsi [2]

Answer:

https

Explanation:

The "s" stands for "secure"

6 0
4 years ago
A seller buys and item from a manufacturer for 9,500
andriy [413]

we need more info

so we can answer the question

8 0
4 years ago
Who Find the exact web server that hosted the website by looking in a huge database of internet addresses
son4ous [18]

Answer:

The Internet service provider (ISP)

Explanation:

The internet service provider provides individuals and other companies access to the internet and other web services. The internet service provider looks through a huge database of internet addresses to find the exact web server that a website is hosted on when a query is sent.

4 0
3 years ago
Explain how advanced analytics (e.g., Machine learning) helps the threat life cycle management. State the stage of the threat li
noname [10]

Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

<h3>What is Advanced analytics?</h3>

Advanced analytics refers to the computation strategies that are able to manage a huge number of parameters to model a situation.

Advanced analytics is very useful in epidemiology because this approach allows for predicting the transmissible behavior of infectious diseases caused by pathogenic microorganisms (e.g., bacteria) and viruses.

In conclusion, Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

Learn more about Advanced analytics here:

brainly.com/question/15007647

#SPJ1

8 0
2 years ago
Other questions:
  • Which sign or symbol will you use to lock cells for absolute cell reference?
    8·2 answers
  • When your Windows XP file becomes too large to fit in a single window, which of these components allows you to bring different p
    6·1 answer
  • Does the game best fiend need wifi to play on the app?
    8·2 answers
  • What is a resume?A collection of all your professional and artistic works.A letter which explains why you want a particular job.
    6·1 answer
  • A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a lat
    9·2 answers
  • What’s an input Device
    7·2 answers
  • 1.
    15·1 answer
  • Choose one skill needed to become Computer Network Administrator?
    10·2 answers
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
  • which command entered without arguments is used to display a list of processes running in the urrent shell
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!