1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
8

What precautions should be taken to make a computer more secure ​

Computers and Technology
1 answer:
Sergeeva-Olga [200]3 years ago
4 0

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

You might be interested in
Which of the following is a difference between a centralized communication network and a decentralized communication network? a.
Crazy boy [7]

Option D is the answer.

Option A is rejected because in centralized communication notwork there is no free flow of communication in all directions ( all direction means between all the groups or layers of the network).

Option B is not the answer because centralized and decentralized networks has nothing to do with the size of organizations.

Option C is rejected because decision making process depends on the hard work and technical skills of groups of an organization about a field but not by the network discipline.

Option D is selected because in centralized network the information or decision making power is primarily limited to the upper level or higher members of organization and as mentioned decentralized decides on the basis of decision of all the groups or levels of the network.

5 0
3 years ago
What is the program filename and extension of file explorer?
Klio2033 [76]

Explorer.exe is the program filename and extension of File Explorer.

To add, File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the filesystems.

4 0
3 years ago
What are pixels that are the exact same between multiple frames called?
Oxana [17]

Answer:

the answer is temporal redundancy

Explanation:

Computer Definition. Pixels in two video frames that have the same values in the same location. Exploiting temporal redundancy is one of the primary techniques in video compression (see interframe coding). Contrast with spatial redundancy.

6 0
4 years ago
Computers in a medical office should be protected by which of the following security tools?
Verizon [17]
<span> it is necessary to maintain your computer on a regular basis. .... Remember these key points when recommending the Internet to a patient

Hope it helps.
</span>
8 0
4 years ago
Read 2 more answers
Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely tru
madreJ [45]

Answer:

D. The image will require fewer bits in order to be represented.

Explanation:

Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

5 0
3 years ago
Other questions:
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    10·1 answer
  • Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta
    13·1 answer
  • What feature did we use to quickly apply the formatting shown in this image?
    9·1 answer
  • Which tool allows multiple users to dynamically update a document at the same time? Question 3 options: Google Docs OneDrive Exc
    14·1 answer
  • An information system report is an example of...
    13·1 answer
  • A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app
    13·2 answers
  • What is the small ribbon inside a microphone that pick up vibrations
    7·1 answer
  • What is a Network It’s a system that is used to link two or more computers and name the different types of networks.?
    11·1 answer
  • Technology that transfers page images composed inside a computer directly to printing plates is called:
    10·1 answer
  • if a manager identifies numerous data integrity issues, she/he should consider the reports generated from that data as invalid a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!