Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleting temporary files Removing device drivers Organizing data Updating malware Removing partitions

Answers

Answer 1

Answer:

Cleaning inside the computer

Defragmenting the hard drive

Deleting temporary files

Organizing data

Explanation:


Related Questions

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

The CPU is responsible for?

Answers

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

Other Questions
EspanolIn the past year Christine watched 24 movies that she thought were very good. She watched 60 movies over the whole year. of the movies she watched, whatpercentage did she rate as very good? PLZ HELP!!! Find the range of the following piecewise function. Assuming that a person going to community college can't afford to go to a four-year college is an example of a) a generalization. b) discrimination. O c) a stereotype. O d) tolerance. PLEASEEEE HELLLLP MEEEE Due to employee safety negligence at a nuclear waste facility, 2000 tons of a radioactive element is spilled into the nearby pond. The half-life of the radioactive element is 36 days. In order to be declared safe for swimming, based on its size and the amount of water, there must be less than 100 tons of the material found in the pond. How long, to the nearest day, until it is safe to swim again? Graph the line for y+1 = - 3(2x - 4) on the coordinate plane. How many skirt-blouse outfits can a woman choose from if she has 5 skirts and 6 blouses? ba x th c lp bn vo mt mc tiu. xc sut bn trng tng ng l 0,8; 0,7; 0,6. mi x th bn mt vin. gi X l s vin bn trng.a) lp bng phn phi xc sut.b) tnh E(X) v VAR(X) Using a little - Little - A few - few - a great deal of - hardly and of and Example sentence. Hariqbal is preparing an online dating profile. One of the questions for the profile is whether he is a romantic person. In order to answer this question, Hariqbal thinks back on some of his most recent actions. Since in the past week he read a book of love poems, enjoyed a dramatic film, and took a long walk by the beach, he decides that he must be a romantic person. What process has Hariqbal engaged in Define personification PLEASE HELP ME OUT I NEED IT RIGHT NOW!! :((( binomial expansions for clever cookies HELP, round to the nearest penny.$11,579.9998 What is the significance of this quote? "To be nobody but yourself-in a world which is doing its best,night and day, to make you everybody else - - means to fight the fight the hardest battle any human being can fight, and never stop fighting." Your clients, spouses Jared and Joaquim, are both 33 years old. They are concerned about saving money for a down payment on a home. Currently they have $120,000 set aside for that purpose. They plan to start a family in about a year and would like to buy the home in six months. The amount they have saved is more than 20% of the value of the homes in the area they want to move. They look to you for a place to save the money until they need it. Which of the following is the most suitable recommendation for the couple?A) A 26-week T-billB) The Windmill Growth FundC) The Oldtime Life Insurance Company Variable AnnuityD) The Benji Money Market fund Hi there, I have this assignment from a course called syntax, its about the subject and predicate... I hope you guys help me out with the explanation. THANK YOU. One the first chemistry test. 12 students got As, 18 students got Bs, and 20 students got Cs.a. What is the percentage of students received Bs. b. What is the percentage of students who received Cs? Express your answer to the ones place. Complete this sentence with the correct form of avior Les tudiants ____ besion de livres The Punnett square illustrates a cross for color of the flower.Based on the phenotypes and genotypes of these offspring. It is clear that purple flower color allele isand the parents aredominantpolygeneticrecessiventum. All rights reserved.hp