Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet. True False

Answers

Answer 1

Answer:

True - Firewalls are software programs/hardware devices designed to keep computers safe from hackers


Related Questions

A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do

Answers

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

how can i get better at typing because i suck

Answers

Answer:

Keep typing until you get used to it ●___●

I tried this technique
I look at the keyboard to type a random word like multiple times and then I would try it without looking. If I did it I go on
Hope this helped *smiles*

Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creating/copy the documents?

Answers

Answer: Yup!

If you'd rather take a picture with your phone, just back transfer the photos into your computer if necessary.

c724 wgu True or false. A storage device consists of all the components that work together to process data into useful information

Answers

Answer:

False

Explanation:

A output device consists of all the components that work together to process data into useful information


4. What are the things that a computer literate understands?name them

Answers

[tex]{\blue{OII}}[/tex]

[tex]{\green{TUDO}}[/tex] [tex]{\red{BEM ?}}[/tex]

The activities that the computer scientist develops Data structuring, development and design. CG. Numerical analysis and development of algorithms. Database management. CG.

[tex]{\red{TCHAU }}[/tex]

❤❤

With ok g hey Ed F egg to TK up TK A

Write a python application that allows a user to enter any number of student test scores until the user enters 999. If the score entered is less than 0 or more than 100, display an appropriate message and do not use the score. After all the scores have been entered, display the number of scores entered and the arithmetic average.

Answers

Answer:

This program is as follows

total = 0; count = 0

testscore = int(input("Score: "))

while testscore != 999:

   if testscore < 0 or testscore > 100:

       print("Out of range")

   else:

       total+=testscore

       count+=1

   testscore= int(input("Score: "))

print(count,"scores entered")

print("Arithmetic Average:",total/count)

Explanation:

This initializes total and count to 0

total = 0; count = 0

This gets input for score

testscore = int(input("Score: "))

The following iteration stop when 999 is entered

while testscore != 999:

This prints out of range for scores outside 0 - 100

   if testscore < 0 or testscore > 100:

       print("Out of range")

Otherwise

   else:

The total score is calculated

       total+=testscore

The number of score is calculated

       count+=1

Get another input

   testscore = int(input("Score: "))

The number of score is printed

print(count,"scores entered")

The average of score is printed

print("Arithmetic Average:",total/count)

what is storage unit in computer and five examples of storage units.

Answers

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files.You want the connection to be as secure as possible. Which type of connection will you need?

Answers

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

what can be the maximum possible length of an identifier 3163 79 can be of any length​

Answers

Answer:

79 characters

Explanation:

The programming language is not stated, but a little search online shows the question is about python programming language

Literally, identifiers are the names given to variables, arrays and functions.

In most programming languages (e.g. python), identifiers are case-sensitive.

i.e. Abc is a different identifier when compared to abc.

Having said that, python allows up to 79 characters to name an identifier.

Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.

Analizar los componentes de una computadora completa hoy en día comparada con el inicio de la Informática.

Answers

Answer:

Explanation:

Las computadoras que existian en el inicio de la informatica y las que existen ahora tenian los mismos componentes. Estos eran CPU, Placa Madre, RAM, HDD, y tarjeta grafica. Lo que si cambio fueron el velocidad y capacidad. Por ejemplo, en el inicio las Tarjetas de RAM venian como DDR a una velocidad maxima de 133 Mhz con una capacidad de entre 4mb y 8mb. Hoy en dia tenes RAM de DDR5 con una velocidad de 4400 Mhz y de 8gb. Mientras que avanzaba el tiempo los componentes de las computadoras aumentaban en velocidad y capacidad aunque el tamaño bajaba o aumentaba dependiendo del gusto del usario.

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.

Answers

Answer:

focuses on a certain subject

Explanation:

it means that it focuses on that one subject and none others

Hope it helps c:

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Answers

Answer: Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly

Explanation:

Since the person is concerned about the security of these devices, in order to increase their security posture, the latest firmware updates should be installed fom the device manufacturer.

The firmware is the software program or set of instructions which is programmed on a hardware device. Installing the latest update is necessary in order to prevent third party use or hacking. Also, it's vital to check the network's existing security infrastructure in order to check if it's working properly.

Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of:

Answers

Group of answer choices.

A. firms giving away products for half of a two-sided market to seed the market.

B. one market attempting to conquer a new market by making it a subset, component, or feature of its primary offering.

C. firms spreading costs across increasing units of production or in serving multiple customers.

D. firms taking advantage of complementary products developed for a prior generation of technology.

E. markets, once considered distinctly separate, beginning to offer similar features and capabilities.

Answer:

A. firms giving away products for half of a two-sided market to seed the market.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

An open-source software is a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

In this scenario, Adobe giving away the Acrobat Reader to build market for the sale of software that creates Acrobat files. Thus, this is an example of firms giving away products for half of a two-sided market to seed the market.

When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variable

Answers

Answer:

The value of the primitive type variable is passed into the receiving method

Explanation:

Examples of primitive data types are integers, floats, real, double, character, byte, etc.

When any of these data types variables are passed to a method, the method which receives the variables receives the value of the variable being passed.

Take, for instance; the following code segment:

int doubleNum(int num){ ..... }

int main(){ ... num = 2; doubleNum(num);}

The above function doubleNum will receive the value of num (which is 2).

como se llama el arte de pintar en las cuevas sus actividades de caceria

Answers

shsibdhebduduebsisodbduei


What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

1) a program that is designed to perform only one task.

Answers

Answer:

special purpose application software

Explanation:

it is a type of software created to execute one specific task.for example a camera application on your phone wul only allow you to take and share pictures.

Other example of special purpose application are web browsers,calculators,media playors,calendar programs e.t.c.

which advanced boot option starts windows, but loads only the drivers necessary for basic functionality

Answers

Answer:

The correct answer is: The Safe Mode

Explanation:

Safe Mode is an advanced boot option available in Windows. It is of two categories:

Safe Mode  and Safe Mode with Networking (this option allows inter and intra network conectivity)

It is useful for troubleshooting a windows operating system to find out why it is dysfunctional.

It can be activated by pressing the F8 key as the Windows Operting system boots up, but not after.

Cheers!

In _____ conversion of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired.

Answers

Explanation:

Phased-In-Phased-Out Conversion

When an application has multiple uses what is it known as?
A. Minimum Features
B. Full Featured
C. Limited Features
D. Maximum Features

Answers

B.Full featured application

Convert to different number system as mentioned.(17)10=(?)2​

Answers

“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

Program design tools. __________ uses English-like statements to outline the logic of a computer program. __________ graphically shows the step-by-step actions a computer program will take.

Answers

Answer:

Pseudocode; flowchart.

Explanation:

Pseudocode uses English-like statements to outline the logic of a computer program. A pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices.You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.Which solution should you implement?

Answers

Answer:

Host-based IDS

Explanation:

A host-based IDS is installed on a single host and monitors all traffic coming in to the host. A host-based IDS can analyze encrypted traffic because the host operating system decrypts that traffic as it is received.

¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations

Answers

Answer:

economical reasons

Explanation:

A metropolitan area network (MAN) is formed by an aggregation of multiple local area network (LAN) that are interconnected using backbone provided by an internet service provider (ISP). A metropolitan area network (MAN) spans for about 5 kilometers to 50 kilometers in size.

Basically, a metropolitan area network (MAN) spans across a geographic area such as a city and it's larger than a local area network (LAN) but significantly smaller than a wide area network (WAN).

Hence, a wide area network (WAN) is designed to span over a very large geographical area and as such would cost more in implementing than a metropolitan area network (MAN) would cost.

This ultimately implies that, metropolitan area network (MAN) speeds are faster than WAN speeds because of economical reasons.

there are....... section in
cpu

Answers

Explanation:

The CPU is made up of three main components, the control unit , the immediate access store and the arithmetic and logic unit .

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

Susan works for a company that values their employees me and deadlines in finding ways to keep the cost of doing business low what quality standard does Susan company value?

Answers

The correct answer to this open question is the following.

Although there are no options attached, we can answer the following.

Susan works for a company that values its employees and deadlines in finding ways to keep the cost of doing business low. The quality standard that Susan's company values is "efficiency."

The company where Susan works is focused on the efficiency of all systems and procedures of the organization. This trait allows the company to also be productive, getting all the work in time. So we could say that Susan's company values efficiency and effectiveness.

Leaders of these kinds of organizations should be great communicators and good listeners to perform under pressure.

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

Other Questions
A farmer wants to fence in a rectangular plot in a large field, using a rock wall which is already there as the north boundary. The fencing for the east and west sides of the plot will cost $4 a yard, but the farmer needs to use special fencing which cost $5 a yard on the south side of a plot. If the area of the plot is to be 600 square yards, find the dimensions for the plot which will minimize the cost of the fencing. Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host. Describes the biggest choice of activities for teenagers Assume that as their leader, you wanted to influence minimum wage earners in a plastic bottle recycling center to work faster. Which one or two influence tactics are likely to be effective When the angle of elevation of the sun is42, fnd the length of the shadow, to thenearest foot, cast by a tree 60 feet tall. How Is the physical geography influenced The location of the largest US cities, such as New York, Los Angeles, and Chicago?A. These cities were built close to where the nations Electric generating stations were located at the Time.B. These cities were built in places that receive the consistent rainfall needed to support farming. C. These cities were located near oceans because their early Industries depended on easy access to shipping lanes.D. These cities are located near water because when they were first settled, water was the main method of traveling. The third sentence of the Federalist Papers #10: "He will not fail, therefore, to set a due value on any plan which, without violating the principles to which he is attached, provides a proper cure for it." In this sentence, the phrase "without violating the principles to which he is attached" most likely refers to (-6)^-1 multiply by x = 27^-1. find x PLEASE HELP ITS EASY BUT LIKE yh if anyone could answer any of these pls do!!!!!! Which is the ratio of triangles and to hearts there is 22 hearts and 11 triangles which fundamental units are involved in force do step Wise How many years will it take $2,000 to grow to $3,300 if it is invested at 4.75% compounded continuously? Find the H.C.F. of the following numbers using division method(a) 24, 40 Marcel and Floyd are playing games at an arcade. Marcel has $8.25 and is only playing $0.25 games. Floyd has $9.75 and is only playing $0.75 games. Jorge wants to find the number of games after which Marcel and Floyd will have the same amount of money remaining. Jorges work is shown below. You are given the following information about x and y. x y Independent Dependent Variable Variable 15 5 12 7 10 9 7 11The least squares estimate of b 0 equals ______. a. 16.41176 b. 1.3 c. 21.4 d. 7.647 Which expression has a solution of 11, if m = 1?m - 1111 + m14 - mm + 10 Your first morning in your new office, you reflect on what type of manager and leader you hope to be. Which of the following best reflects what you believe about employees and how they can best be led? a. Employees are more loyal and productive if they feel that their leader is admirable, caring, and ethical. b. Employees behavior can be shaped and motivated, not only by rewarding good behavior but also by penalizing bad behavior. c. Employees need to be discouraged from bad behavior. d. They work harder when they know that failure has consequences. the area of a rectangular bathroom mirror is 20 square feet. it is 2 feet tall. how wide is it? What I need to know is different than what you need to know, but right now, I need to social studies. What do you need to know?