1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
3 years ago
10

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar

e installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do
Computers and Technology
1 answer:
Furkat [3]3 years ago
8 0

Answer:

You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.

Hope this help please give the brainliest award would be much appreciated.

You might be interested in
A(n) __________ is a recording of a motion picture, or television program for playing through a television.
lisabon 2012 [21]
A video is a recording of a motion, or television program for playing through a television. A camcorder is a device or gadget that is used to record a video. audio is the sounds that we hear and mix media is a tool used to edit the video.
3 0
3 years ago
Read 2 more answers
1. Explain what is meant by the following data types:
Colt1911 [192]
An Integer in an object that represent an int (Integer a = new Integer(3) would represent 3).

I'm not sure about Real.

A String is an object that represents a word. (String a = "dog")

Boolean

String

int

int

Hope this kind of helps
4 0
4 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
What is a formula? What is a function? (In the context of Excel)
mel-nik [20]

Answer: A formula is an expression which calculate the value of a cell .A funcation is a predefined formula that performs calculations using specific values in particular order.According to context of excel.

4 0
4 years ago
Which visual or multimedia aid would be most appropriate for introducing a second-grade class to the location of the chest’s int
creativ13 [48]

Answer:

It's A: a drawing

Explanation:

Did it on EDGE

8 0
3 years ago
Read 2 more answers
Other questions:
  • Design a data structure to support the following two operations for a set S of inte- gers, which allows duplicate values: • INSE
    15·1 answer
  • You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
    9·1 answer
  • Enterprise Resource Planning (ERP) is an example of a single user database.
    7·1 answer
  • The length property of the String object returns
    15·1 answer
  • Which of the following are benefits of designing a scalable system? Choose 3 options.
    15·1 answer
  • Can i add ADSence on bangla content in blogsopt website?
    12·1 answer
  • Which of the following is not true about a list of lists
    12·1 answer
  • Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
    13·1 answer
  • Factor completely: 4y^2 - y - 3
    6·2 answers
  • There are two main types of hard drive available to a computer. State what they are and describe their use.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!