1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
9

What do you believe are the advantages of a clean install over an upgrade? What additional choices do you think are important to

make during the installation? Why?
Computers and Technology
1 answer:
Allushta [10]3 years ago
3 0

Answer:

Upgrade refers to upgrading to a new version from old version

Clean Install: Removing old version completely and install from scratch

Explanation:

Let you want to upgrade windows server 2008 to windows server 2016.There are 2 options

1. you can directly migrate windows server 2008 to 2016 by keeping everything as it is , so all the data and applications on the system remains as it is and only OS will upgrade.

2. uninstall everything and clean install windows server 2016.Here all previous applications and data are erased

In the above case if all applications on the system are compatible with windows server 2016 from 2008 we can go for upgrade directly otherwise it is better to go with clean install as we need different version of application which is compatible with windows server 2016

You might be interested in
Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
Dmitriy789 [7]

Answer:

The solution code is written in Python 3

  1. count = 0
  2. sum = 0
  3. num = input("Enter a number: ")
  4. while(num != ''):
  5.    sum += float(num)
  6.    count += 1
  7.    num = input("Enter a number: ")
  8. print("Sum : " + str(sum))
  9. print("Average: " + str(sum / count))

Explanation:

Firstly, we declare two variables count and sum to hold the number of input number and the total of the input number, respectively (Line 1-2)

Next, we prompt user to input the first number (Line 4). While the num is not ' ' (This means it is not "Enter" key), accumulate the num to sum variable and increment count by one (Line 6-8) and then prompt the user to input the next number (Line 9).

At the end, display the sum and average using print function (Line 11 -12).

5 0
4 years ago
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
An example of cooler red is
BARSIC [14]

apple, stop sign, fire truck, stop light... ect

6 0
3 years ago
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
Listed three functions tht are ysed in a spreadsheet​
Karo-lina-s [1.5K]

Answer:

The sum function

The count function

The trim function etc.

5 0
2 years ago
Other questions:
  • GIMP's official website is _____
    6·1 answer
  • How to Ctrl + shift + F4 but in a HP laptop?​
    8·2 answers
  • During flashbacks you experience______.
    14·2 answers
  • Choose the list of the best uses for word processing software.
    5·1 answer
  • Why were spices very important 500 yr and what did people use them for
    8·1 answer
  • Create a list of strings based on a list of numbers The rules:_______
    8·1 answer
  • Design and implement a set of classes that define various types of electronics equipment (computers, cell phones, pagers, digita
    13·1 answer
  • Which IP QoS mechanism involves prioritizing traffic? Group of answer choices IntServ RSVP COPS DiffServ None of the above
    14·1 answer
  • How is your mental health as you're returning to school virtually or in
    13·1 answer
  • Which popular tool is used in agile software development TCS?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!