1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
7

What two windows security updates do most organizations always patch?

Computers and Technology
1 answer:
Zigmanuir [339]3 years ago
6 0

Answer:

Explanation:

Patch Tuesday is the name given to the day each month that Microsoft releases security and other patches for their operating systems and other software. Patch Tuesday is always the second Tuesday of each month and more recently is being referred to as Update Tuesday.

You might be interested in
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP
Sav [38]

Answer:

D. Zero-day

Explanation:

It is clearly stated that the antivirus is still up-to-date on the workstation, and there has been no alterations to the firewall. Hence, this means the software is functional and up-to-date with all known viruses. This shows that this attack is unknown to the manufacturer of the antivirus software and hence no virus definition or patch fixing this problem has been developed yet. In this light, it is a zero-day.

A zero-day is a type of vulnerability in a software that is not yet known to the vendor or manufacturer, hence this security hole makes the software vulnerable to attackers or hacker before it is been fixed.

4 0
3 years ago
Networking Gadgets, Inc. currently employs eight people but plans to hire 10 more in the next four months. Users will work on mu
grandymaker [24]

Answer: Server based network

Explanation:

 The server based network is the type of network in which the special type of computer mainly handle the various networking tasks like the storing file, managing printers and authenticate the users in the system. The server based network are also responsible for run various types of application like the email and the database system.

The microsoft windows 2016 and the window 2012 are the two ideal OS (Operating system) that mainly used in the server based network.

Therefore, we use the server based network as it easy to backup and manage in the networking system.

3 0
3 years ago
How do multi-cellular organisms develop?
FromTheMoon [43]
Letter B. is the answer
<span>B.  Cell differentiation - start from a single cell and as the cells divide they become specialized</span>

HOPE THIS HELPS















4 0
3 years ago
The processor in Q1 above is converted into an 8-stage pipeline, similar to the one discussed on slide 8 of lecture 16. It takes
Nadusha1986 [10]

Answer:

1000/125 billion instructions per second.

Explanation:

All the stages take 125ps and latch time was outlooked.

The clock speed would be the highest stage time in all 5 stages. Here all are same clock speed it would be 125ps only.

throughput = 1/cycle time so ⇒ 1/125 instructions/ps

Since we want it in billion instructions per second so we have to multiply with 10⁻⁹ /10⁻¹² then the result is 1000/125 billion instructions per second.

3 0
3 years ago
What is the e-file rejection error for an Invalid bank account or routing transit numbers?
dezoksy [38]
Usually when you encounter the problem you see the error code number "0019" for an invalid bank account or routing transit numbers.

Accounting information is the subject to which this is categorized. As soon as the IRS or (Internal Revenue Service) suspects any error, it will deny the return immediately. 
3 0
3 years ago
Other questions:
  • Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
    11·1 answer
  • The times per second an audio file is converted from analog to digital is the ______. audio file format bandwidth sample rate wa
    5·2 answers
  • A computer that no longer works after having minor repair works done to it may have been damaged by
    8·2 answers
  • Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified len
    14·1 answer
  • Do you think that people have a “right” to remain anonymous online? Why or why not?
    6·1 answer
  • What are seven main internal parts of a computer
    7·2 answers
  • Miguel owns a tile business. He has two employees who work in a small office. One answers phones and schedules appointments. Ano
    11·2 answers
  • Which of the following is NOT an example of soft skill?
    8·1 answer
  • Microsoft Access is a
    10·1 answer
  • It would be at least two decades before some of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!