1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
1 year ago
15

1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.

Computers and Technology
2 answers:
BartSMP [9]1 year ago
7 0

An android phone is outdated .Like all brands there is

  • No more security patches.
  • No more Operating system updates.

If it still requires updates then follow the instructions

  • Disable OEM by going through developer options.It will directly turnoff all security restrictions from first (Your phone is not receiving any security patches so these restrictions are not of any use now)
  • Now try to search through web for finding custom roms of most trusted companies .
  • Some examples:-Pixel,Linux, Microsoft etc
  • Install them on phone and activate.
  • You will experience those UIS on your phone+There will be no harm to device as they are equipped with security patches for whole life .

#2

The trusted antivirus apps

  • Norton
  • Bitdefender
  • Avast
Alexandra [31]1 year ago
6 0

Answer:

Question 1:

» Go to settings

» Go to phone or device system

» Go to system update

» If you have update files, go to local update

» If you lack update files, go to online update

» The phone will reboot.

{ \tt{ \red{make \: sure \: battery \: is \: above \: 50\%}}}

or else, connect the OTP charger.

Question 2:

• Avast mobile security

• AVG antivirus [ an avast inc. ]

• Phone master

• Norton mobile security and firewall

You might be interested in
Notice that the percentages range from just over 55% to just under 65%. This is a range of 10%, so we're going to use 5 evenly-s
vfiekz [6]

Answer:

import numpy as np

l_int = 55/100

h_int = 65/100

hist = np.histogram( paid_tax_preparers_list, bins=5, range=(l_int, h_int))

Explanation:

Numpy is a Python package used to ease mathematical and statistical research calculations. The package creates data structures called arrays that can be used as vector items, making it easy and fast for calculation to be done.

The np.histogram method is used to create or plot histograms of a list or array against the frequency of the items in the array. The bins and the range attributes are used to adjust the display of the histogram, with bins being the number of bin in the graph and range is the given length of the histogram.

7 0
2 years ago
Easy 25 points answer what is it called that you use only 1 and 0 like this 1010010011001100011110001010010101001010101010010101
Arlecino [84]
Binary. Is the correct answe
3 0
3 years ago
What is a computer system?
klio [65]
A system of interconnected computers that share a central storage system and various peripheral devices such as a printers, scanners, or routers. Each computer connected to the system can operate independently, but has the ability to communicate with other external devices and computers

<span>Read more: http://www.businessdictionary.com/definition/computer-system.html</span>
4 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
how can a user open a blank presentation? 1.on the file menu, click new, and then click recent templates 2.on the file menu, cli
4vir4ik [10]

2.  on the file menu, click new, and then click blank presentation.

5 0
3 years ago
Other questions:
  • How do IT security workers help business
    5·1 answer
  • To connect multiple usb devices to a single usb port, a ____ can be used.
    12·1 answer
  • Why do contour lines never cross?
    5·1 answer
  • To support continuous improvement efforts in the workplace, you increase the number of tasks that an employee performs and have
    7·1 answer
  • In this chapter, you saw an example of how to write an algorithm that determines whether a number is even or odd. Write a progra
    6·2 answers
  • What is the maximum amount of memory that vmachine1 can use in its current configuration with startup ram set to 1024 megabytes?
    14·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • 1. A database table can hold ??
    9·1 answer
  • I love my baby boy and can someone help me with this
    6·1 answer
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!