1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
11

Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma

lware detection software
Computers and Technology
1 answer:
Shalnov [3]3 years ago
4 0

Answer:There are several software products and settings you can make that will help alert you to or protect you from certain kinds of technology attacks such as malware, viruses, and so on.   Use these programs and keep them up to date so they can defend you against the latest threats.

Explanation:

You might be interested in
The members of the IT department have spent two days debating the best approach to roll out the new software update. After allow
devlian [24]

Answer:

<em>Functional conflict</em>

Explanation:

Functional conflict means<em> encouraging workers to communicate different points of view and address disagreements in a healthy manner that can promote new ideas and new innovations.</em>

This compares with the unstable type of conflict that has no business advantage and only hurts the morale of interaction, productivity and workplace.

4 0
2 years ago
What does brainliest do?
balandron [24]

Answer it gives u points I think

Explanation:

6 0
2 years ago
Read 2 more answers
What is redo and undo?​
umka21 [38]

Answer:

Answer in the below

Explanation:

Redo means the previous one and undo means removing it... i am not so sure..

3 0
1 year ago
PLEASE HELP!!!
uysha [10]
The next line is 0___________________________
3 0
2 years ago
CORRECT ANSWER GETS BRAINLIEST PLEASE HELP !
KIM [24]

Answer:

Mediator

Explanation:

A mediator is a person that tries to reserve peace within groups, and they often try to prevent conflict.

4 0
2 years ago
Other questions:
  • What is the assignment operator?
    15·1 answer
  • Consider the provided C++ code in the main.cpp file: The function func2 has three parameters of type int, int, and double, say a
    8·1 answer
  • As Juan sat in his biology lab, his instructor was droning on about the techniques of vivisection. Juan kept thinking about the
    5·1 answer
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • Describe the difference between a myth and a fable.
    12·1 answer
  • technician is dispatched to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive t
    5·1 answer
  • Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free s
    15·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
  • Which of the following lines of code would reduce the player’s gold by 100 coins?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!