1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
13

Microsoft Security Essentials and Microsoft Forefront are: anti-malware software programs that can be used to harden workstation

computers. port-scanning software utilities that scan for open ports on servers. software programs designed to remove or disable unnecessary user accounts. operating system administration software programs that create and maintain baselines.
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
6 0

Answer:

anti-malware software programs that can be used to harden workstation computers

Explanation:

Microsoft Security Essentials can be regarded as antivirus software which gives protection to our computers used in home or for business against types of malicious software. These malicious software could be

✓trojan horses.

✓ computer viruses

✓spyware

✓rootkits, trojan horses.

Microsoft Forefront can be regarded as

security software for business roduced

by Microsoft Corporation. It was

designed to offer protection to computer networks as well as network servers and individual devices. It should be noted that Microsoft Security Essentials and Microsoft Forefront are anti-malware software programs that can be used to harden workstation computers

You might be interested in
Hypertension occurs when blood pressure is too high.
Ivan
True, hypertension is when your blood pressure is to high.
Please mark as brainliest
8 0
3 years ago
I have a question about my HP Laptop
vekshin1
What exactly is your question?
7 0
4 years ago
Differentiate between computer organization and computer architecture with example
vazorg [7]
<span><span>Computer architecture was essentially a contract with software stating unambiguously what the hardware does. The architecture was essentially a set of statements of the form "If you execute <span>this </span>instruction (or get an interrupt, etc.), then that is what happens." <More sophisticated readers: I get to the term "ISA" later.>
</span><span>Computer organization, then, was a usually high-level description of the logic, memory, etc., used to implement that contract: These registers, those data paths, this connection to memory, etc.

</span></span>Computer Architecture and Computer Organization Examples

<span>Intel and AMD make X86 CPUs where X86 refers to the computer architecture used. X86 is an example on a CISC architecture (CISC stands for Complex Instruction Set Computer). CISC instructions are complex and may take multiple CPU cycles to execute. As you can see, one architecture (X86) but two different computer organizations (Intel and AMD flavors).
<span>
nVidia and Qualcomm on the other hand make GPUs (graphics processing unit as opposed to a CPU central processing unit). These GPUs are based on the ARM (Advanced RISC Machines) architecture. ARM is an example on a RISC architecture (RISC stands for Reduced Instruction Set Computer). Instructions in an ARM architecture are relatively simple and typically execute in one clock cycle. Similarly, ARM here is the computer architecture while both nVidia and Qualcomm develop their own flavor of computer organization (i.e architecture implementation)</span></span>
8 0
4 years ago
Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order func
lara [203]

Answer:import functools

# open your file

file = open("integers.txt", 'r')

file = file.read()

# put numbers into a list

file = file.split()

# convert list into integers

file = list(map(int, file))

# use lambda function to get average.

print(functools.reduce(lambda x, y: x+y / len(file), file, 0))

Explanation:

4 0
3 years ago
A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.
Archy [21]

Answer:

The technician will want to add ACL for ports 20 and 21

Explanation:

The FTP protocol by default will attempt to use 21 for TCP access and 20 for data access.  By enabling an Access Control List (ACL) on ports 20 and 21, the technician can prevent FTP traffic from leaving the network on the default ports.

Cheers.

8 0
3 years ago
Other questions:
  • Suppose you have two arrays of ints, arr1 and arr2, each containing ints that are sorted in ascending order. Write a static meth
    7·1 answer
  • An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
    5·1 answer
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • Tiffany is an instructor at a college that is run on student tuition and not state taxes. Which statement best describes her emp
    6·2 answers
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • Data flow is not a major consideration when building an analytics model. T/F
    13·1 answer
  • MacBook Pro (2019) at 93% max capacity battery rating after 100 charge cycles. Is this normal? Used coconut battery to check thi
    10·2 answers
  • Gaming applications allow users to play solo games as well as play with friends and/or other players
    11·1 answer
  • Please help!!! I am very confused about this question!
    10·1 answer
  • Explain why a holiday on a cruise liner will be an ideal holiday​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!