Answer:
The following are the order of the routine maintenance tasks that is C, A, B, D
Explanation:
For securing the computer system the user has to follow some steps related to the routine maintenance tasks.
- Firstly, the user has to validate the settings on the Windows Update.
- Then, they have to validate the settings on the anti-malware software.
- Then, the user has to validate the setting related to the file-sharing system.
- Finally, they have to validate the frequent optimization of hard drives or hard disks.
Answer: Networking protocols are important as they define a set of rules to be used for exchanging information between computer nodes.
Explanation:
in terms of networking it is required for the source and the destination to have a set of predefined rules which enables the router to send and receive information across the network in such as way that both the ends are able to receive the messages.
The information exchange takes place first by the client by introducing itself to the remote server. the remote server upon receiving the information uses some form of handshaking and acknowledges the client of the receipt of the message.
besides this there are many routing protocols which tells us about the way how packets are sent from the client to the source. There are two types of routing protocols:
1. static routing protocols
2. dynamic routing protocols.