Question

In: Computer Science

Question 1. Pick three security failures of Windows system and explain how you would address them.

Question 1. Pick three security failures of Windows system and explain how you would address them.

Solutions

Expert Solution

2.

Failures of window system and addressing them:

(a) Failure of system restore in windows system:

System Restore is a powerful utility in Windows that allows your system to roll back to a previous point in time. Basically, it is used to undo the changes made to your system.

But System Restore is not successful at all times. You may get errors like ‘System Restore did not complete successfully’ on Windows 10, Windows 7 or other versions.

I would address this problem by an easiest solution is to try another restore point. The point you have selected may have gotten corrupted and preventing you from completing the restore successfully. Hence, by using a different restore point, you are eliminating that possibility.

(b) Upgrade failure of windows 10:

Most Windows 10 upgrades and feature updates succeed without incident. But if you're encountering problems, especially with an older PC, use these tools and techniques to figure out what's going wrong.

I would address this by saying that, PC manufacturers released updates to their BIOS code, specifically designed to address upgrade issues, and sometimes just upgrading the BIOS is enough to solve a failed upgrade.

(c) Failure in booting:

Like Windows 8 before it, Windows 10 uses a hybrid boot to enable fast boot times. When you shut the system down, apps and app processes are terminated, but the Windows kernel itself is hibernated to allow for a faster restart. In theory, it's great, but it seems to still be very slow for some Windows 10 users.

I would address this problem by, disabling it by searching for Power Options in the Start Menu and running the matching Control Panel applet, then in the left-hand pane click Choose what the power buttons do. Click Change settings that are currently unavailable, scroll down and un-tick Turn on fast start-up, then click Save changes. This should prevent very slow starts on affected PCs. Some users report that if they subsequently reboot, re-trace their steps and re-enable fast start-up the problem remains cured.


Related Solutions

Question 3. Pick three security failures of Mac system and explain how you would address them.
Question 3. Pick three security failures of Mac system and explain how you would address them.
Question 2. Pick three security failures of Linux system and explain how you would address them.
Question 2. Pick three security failures of Linux system and explain how you would address them.
1.) Out of the five main population ecology characteristics, pick three of them and explain how...
1.) Out of the five main population ecology characteristics, pick three of them and explain how they are relevant to the current Covid-19 crisis. Identify three biomes with poor soil quality and explain why.
How would you rather address the problems in the social security program. Will you fix the...
How would you rather address the problems in the social security program. Will you fix the current problem that we have now or create a new system like a pre-funded system where everyone did have their own account that will be airmaked for them. Discuss any problems you see with either one of them and which one would you rather support.
Describe, in detail, a research question you could address using GenBank. Explain exactly how you would...
Describe, in detail, a research question you could address using GenBank. Explain exactly how you would use GenBank to answer your question. If you would need information beyond what is in GenBank, explain what information. If not, explain why not
Question 1 Briefly describe how you would address these impacts when working with the Aboriginal and...
Question 1 Briefly describe how you would address these impacts when working with the Aboriginal and Torres Strait Islander people in your region.
1. Explain how you would use the Security Market Line (SML) to discern the breadth of...
1. Explain how you would use the Security Market Line (SML) to discern the breadth of a portfolio’s individual stock winners vs. losers. 2. Explain how the link between price (P) and intrinsic value (V) are viewed by proponents of the Efficient Market Hypothesis and by those who are not proponents.
1. State the three methods of hypothesis test and explain on how you can use them...
1. State the three methods of hypothesis test and explain on how you can use them to test a given claim. 2. Solve this problem using one of the methods for hypothesis test stated in question 1 above. Show all the steps required for the method you selected. A clinical trial was conducted to test the effectiveness of the drug zopiclone for treating insomnia in older subjects. Before treatment with zopiclone, 16 subjects had a mean wake time of 102.8...
In a decision tree, how does the algorithm pick the attributes for splitting? Would you explain...
In a decision tree, how does the algorithm pick the attributes for splitting? Would you explain it logically and specifically?
If you have a network with 300 computers explain how you would setup an IP address...
If you have a network with 300 computers explain how you would setup an IP address scheme to meet the needs of the network (draw this if necessary) If you get a computer that has the wrong IP address and is assigned via DHCP how can you get a new address? Answer for command line and gui. What does it mean when you get a 169.x.x.x address?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT