What do you do when you have computer problems? Check all that apply. PLEASE HELP

Answers

Answer 1
Answer: Can you put the answers to the problem it would be a lot easier for me


And I would look up how to fix the problem on my own before paying someone....

Related Questions

_______ software makes it possible to run multiple operating systems and multiple applications on the same server at the same time.
When do images or graphics in Microsoft Word hurt the document rather than help
Wendy works for a large corporation, and her supervisor has asked her to create an informative PowerPoint presentation for an all-employee meeting. To help create consistency on every slide, which of the following tools should Wendy use?A. Illustrations GroupB. Slide MasterC. Title MasterD. Auto Layout
Which option correctly describes a DBMS application?
The efficiency of a screw is low because of _____. width friction length height

Match the CIA triad to the methods and techniques used to ensure them: preparing for fast disaster recovery with backups and business continuity plans Biometric Verification 1. Confidentiality promptly applying system upgrades and patches 2. Integrity Two-Factor Identification 3. Availability One way encryption checksums (hashes) File permissions Match the terms with associated concepts. used to determine identities and permissions 1. Authentication and Authorization detection of intruders by monitoring network traffic/intruders 2. Prevention and Resistance 3. Detection and Response stop intruders from accessing and reading data Match the terms with associated concepts. Encryption that uses a pair of keys, one called a public key and the other a private key. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption Allows people to exchange secret messages without ever having met to exchange a key 3. One-way encryption < A hash function that generates a digital fingerprint of a message is an example of this

Answers

The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.

The correct matching for the first part of the question is:


1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans

The correct matching for the second part of the question is:


1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders

The correct matching for the third part of the question is:


1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key

Learn more about The CIA triad:

brainly.com/question/30479580

#SPJ11

Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which feature of the word processor corrects this word?AutoCorrect
Spell Check
Grammar Check
Change

Answers

AutoCorrect is the feature of the word processor that corrects this word. AutoCorrect is a software feature that is usually found in word processors and text editing interfaces. This feature mainly functions by correcting spellings and common typing errors. For example if a user types “the winow is closed, autocorrect will automatically change it to “the window is closed”.

I had the same question so i put (A) auto correct.    

Which part of the computing process occurs before storage is used?

Answers

Before storage is used in the computing process, data must be processed and manipulated in the CPU (Central Processing Unit). This includes tasks like input processing, calculations, and various operations performed on the data. Once the data has been processed, it can then be stored in storage devices like RAM (Random Access Memory) or long-term storage such as hard drives or SSDs (Solid State Drives).

Answer:

input

Explanation:

The idea generating technique most often used in writing business letters is:

Answers

Answer:

Brainstorming

Explanation:

Brainstorming is a technique for creating thoughts to take care of a plan issue. It normally includes a gathering, under the heading of a facilitator. The quality of conceptualizing is the potential members have in attracting relationship between their thoughts a free-thinking condition, along these lines widening the arrangement space.

Explain why IT (information technology) has become a vital part of all businesses?(No choices) please hurry!!! Due today!!!

Answers

Well, Information technology became important for business operations, it has helped us learn new things and, keep up to date with the things that happen in every day life. Technology has both tangible and intangible benefits that will help you make money and produce, technological infrastructure affects the culture, efficiency and the relationships of world wide businesses.

, it has helped us learn new things and, keep up to date with the things that happen in every day life

While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server form several workstations on the LAN results in 0% packet loss.Which of the following is the next step the technician should take in troubleshooting the issue?

Contact ISP, inform provider of issue, ask provider to check server.
Verify server has valid IP address on Lan subnet
Escalate problem to server admin to check issues with server.
Check workstations on Lan for APIPA configuration.

Answers

Answer:

The answer is D Check workstations on Lan for APIPA configuration.

Explanation:

1)

While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email server connected to the private LAN.

Pinging the email server form several workstations on the LAN results in 0% packet loss.

Check workstations on Lan for APIPA configuration next step the technician should take in troubleshooting the issue.

Answer:

Check workstations on Lan for APIPA configuration.

Explanation:

IP address is a logical address used in a network to initiate communication between devices. It is assigned to all the end devices like the client computers, servers, printers, scanners etc.

IP addresses can be assigned statically or dynamically. Static IP address configuration requires that a hardcoded address is configured to a computer permanently. The address must be in the same subnet or network. Dynamic IP addressing configures a DHCP server or router to lease IP addresses dynamically to computers. When the computer is unable to reach the server, the APIPA is automatically configured to system which responds to ping but does not receive or send packets to servers.