A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.

Answers

Answer 1

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award


Related Questions

what is the best protection method for sharing pii

Answers

Answer:

What is the best protection method for sharing (PII)? Digitally sign and encrypt the email..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

what is the term used to describe with you connect your phone to another device to share internet access?

Answers

Answer:

This is hyped as the Internet of Things (IoT). Sometimes also called IoE, the Internet of Everything.

Explanation:

describe accessibility in Windows 7 ​

Answers

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.

Answers

Snhahshshshshshhshshshsshhshshshshhs

Cual es de las siguientes pertenece al software de una computadora
A bocina
B teclado
C messenger
D monitor

Answers

Explanation:

a sjsjsjsijdjdnjjjjururueu

Individuals may restructure their investment portfolios because

Answers

Answer:

the results are below expectations

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.

Answers

hi bae systems applied to the relationship

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

A laptop can be kept on palm to work. [true/false) ​

Answers

Answer:

Explanation:

false

excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.

Answers

Answer:

i dont know bout math units but subjects for ict include

microcomputer technology, and systems resource management ,computer systems organization.

Explanation:

Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​

Answers

Answer:

A.

Explanation:

Mark Brainliest if correct!

Answer: Previewing a text. (C)


Explanation: Just got it right.

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

how can a robot differentiate between positive or negative product reviews?

Answers

Answer:

Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.

Please give brainliest.

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

search engines use software that combs the web to find webpages and add new data about them to the database. what is this software called?

Answers

Answer:

They basically use a technology called spider or web crawling, it basically just comb through the internet to find websites or webpages.

please give brainliest.

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

what did the person using the windows command prompt do during round 1

Answers

The windows command prompt is a an interpreter found in Microsoft computers that executes lines of code or commands given by the user if they are valid.

As a result of this, there are different commands which can be given by the user administrator to the windows command prompt which enables them to:

List the hardware information in the computerShow/Check Networking informationScan for viruses or repair bad system files,  etc

Please note that your question is incomplete, so I gave a general overview which should help you get the right answer.

Read more here:

https://brainly.com/question/12787942

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

please help

suppose you work for a large company create a short memo letting your coworker know that July 3 is also a paid holiday​

Answers

From: Tom Pearson, Manager, District Five

Regarding: New Incoming Manager, Geraldine Hines

Dear Comstock Staff: Beginning March 15, 2018, you will have a new District Five Regional Manager. After 35 years of continuous service, I am leaving all of you to pursue an exciting future.

It has been my pleasure to train my successor, Geraldine Hines, this past year. Geraldine has demonstrated that she shares the company vision to be the employer of choice here in the Valley of the Sun. I am confident that she will lead all of you into the stratosphere as we merge our call centers and expand our donor site availability.

Please give Geraldine the same level of excellence you have given to me, to our staff and to our donors.

Sincerely.

Tom Pearson, Outgoing Manager, District Five

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

what does your dns server might be unavailable mean?

Answers

Answer:

flush your dns

Explanation:

The water splashed all over the top of the car.

Answers

Answer:

e

Explanation:

Dry the car of i guess

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

Order the steps to describe how to import a contact list in Outlook 2016.

Answers

Answer:  above is correct

In Backstage view...

Click Import/Export

Choose Import from...

Select CSV format...

Choose a destination....

Explanation:

The steps followed to import a contact list in the Microsoft Outlook 2016 are:

In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.

What is Outlook 2016?

The Microsoft Outlook 2016 is a software system that helps the users to manage  their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.

The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.

Learn more about Microsoft Outlook , here:

https://brainly.com/question/26695071

#SPJ2

Other Questions
Which organism has an exoskeletoncrabtreedeerelephantPLS HURRY!!!! 14 Describe yourself and othersCompleta las oraciones con las formas correctas de ser, estar o tener.(Fill in the blanks with the correct forms of ser, estar or tener.)1. Por quella triste?(t) hambre?2. Franciscomuy estudioso.6. Los jugadores--cansados.3. Yo no enojada.7. Pilar y Lupe simpticas.4. Ustedes razn.8. Yomiedo! .5 An accountant passed the closing entries of the expenses and then closed all the expense accounts by crediting them. Which account should she debit to complete the dual aspect of the journal entry?A. income accountB. income summary accountC. revenue accountD. purchase accountE. equity account Yoooo! I'm back! Hope y'all had an excellent summer break, and had lots of fun! *25 points* an someone pls tell me how many solutions this equation have The land ordinance of 1785 established a plan for dividing land and creating states in what part of the nation? Trapezoid ABCD was dilated to create trapezoid A'B'C'D'.On a coordinate plane, 2 trapezoids are shown. Trapezoid A B C D has points (negative 4, 0), (negative 2, 4), (2, 4) and (4, 0). Trapezoid A prime B prime C prime D prime has points (negative 2, 0), (negative 1, 2), (1, 2), and (2, 0).Which statements are true about the trapezoids? Select three options.Incorrect answer:Sides CD and C'D' both have the same slope, 2.Selected Answer - IncorrectCorrect answer:The length of side A'D' is 4 units.Correct answer:The length of side AD is 8 units.Answer,The image is larger than the pre-image.The correct answers are B, C, and D How can you determine your resting heart rate and estimate your max HR? the two proteins directly involved in muscle contraction are broadly called someone help me if you can :) what is the main purpose of the extracellular matrix surrounding osteocytes Why are alloys generally used to make everyday objects? If a metal has a mass of 78.2 g and a volume of 11.4 mL, what is its density? there are 25 students in class 2-11 and 20% wear glasses. How many wear glasses? expression is equivalent to (f + g)(4) Please I really need help. (Due tomarow) Write a 4 paragraph story with the words Burger, Fries, and Coffee. Why is it important to understand the limitations of the data?Please help! thank you! (Y^2+y)(3y^3-2y^3)=y^2(3y^3-2y^3)+y(3y^3-2y^3)is an example of: in a eukaryotic cell, where does transcription occur? which type of control agent exerts noncompetitive inhibition?