1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scilla [17]
2 years ago
11

If you use microsoft windows, the windows _____ application can automatically update the operating system as well as microsoft p

rograms installed on your computer
Computers and Technology
2 answers:
OleMash [197]2 years ago
5 0

Answer:

Microsoft Windows 10 ... (Windows) If you accidentally delete files from your computer's hard drive, ... Upgrade to remove ads ... (Windows) Applications (or apps) in Windows 10 that you use frequently can be ... the operating system, installed programs, settings, and user files that you can later use to recover your computer.

Explanation:

adell [148]2 years ago
4 0

Answer:

Task Manager?

Explanation:

You might be interested in
Please help me with these short questions >..
Thepotemich [5.8K]

Answer:

bmjcmbbobnkpkkjkbk

Explanation:

vuvkopbbkvkhovjlplbkp

6 0
2 years ago
Berikan contoh perameter sebuah meja.​
lara31 [8.8K]

Answer:

The simplest of table parameters are rows, columns, page number, alternate row, column header, Table title, etc.

Explanation:

The simplest table parameter is as being mentioned above. Its, however, important to understand what are the parameters. Parameters are the features of an object that defines its behavior. Various parameters are the behaviors of the object hence, and here it is the table and the behavior of the table is being described with the parameters. There are so many other parameters that one can think of related to tables. And we should make a list of them for future studies. Font size, Font color, border, etc are some more from the huge list.

5 0
3 years ago
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
Andrei [34K]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

8 0
3 years ago
A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
defon

By Tx/Rx reverse the technician can address this issue.

C. Tx/Rx reverse

<u>Explanation:</u>

Technician has to trouble the laptop, since the laptop is connected and got internet while is the network resources inside the office. But if he connects the same laptop in research lab end user is not connected

Following troubleshooting to made

1. Routing is done properly

2. Any packet dropping by using TRACE command in windows operating system.

Since DHCP is used in office, whereas same type is not used in research lab. End user can try TX/RX reverse cable to connect in the research laptop.

5 0
3 years ago
Which types of files are saved with the .Mp3 and .Zip extensions? Files are saved with the .Mp3 extension and files are saved wi
maw [93]

Answer:

Audio files have the ".mp3" file extension and compressed files have the ".zip" file extension.

Explanation:

6 0
2 years ago
Other questions:
  • Please help!
    15·1 answer
  • What are the three fundamental elements of an effective security program for information systems?
    11·2 answers
  • A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.
    8·2 answers
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • ? An attempt to harm damage or cause threat to a system or network is broadly termed as
    9·1 answer
  • Discuss, in detail, the usefulness of graphics and images in program development. Explain the importance of the interface of a c
    7·1 answer
  • Whats the answer :)?<br>i will give brainslist​
    11·1 answer
  • How do Brainly experts and verified users format their answers to look like this:
    12·2 answers
  • What kind of skill is persuasion?
    7·1 answer
  • Which background-repeat value represents this div?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!