1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
10

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private

network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described
Computers and Technology
1 answer:
Oksana_A [137]3 years ago
4 0

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

You might be interested in
Select the correct answer.
storchak [24]

Answer:

B. Planning

Explanation:

I believe the developer establishes the project goals in the planning phase.

6 0
4 years ago
What is RAD? List an advantage and a disadvantage of using RAD.
ahrayia [7]

Answer:

 RAD is the technique that are used in software development methodology to facilitate the application of the various software development. It is basically provide the high availability of software for he designers. It works on the principle of waterfall model.

Advantages-

  •  It is useful to reduce the overall risks in the system
  •  It is flexible to change
  •  The high level abstraction are easy to transfer

Disadvantage-

  • This process cannot be use in small level projects
  • Not all the applications are suitable with the RAD  
  • It does not work on high technical complexity

7 0
3 years ago
The power relationship on a transformer states that O Power in = power out + loss O Power in = 1/2 power out (Power in = 2 x pow
lions [1.4K]

Answer:

D

Explanation:

5 0
3 years ago
You are testing a web application for sql injection vulnerabilities. you send various sql statements which return results on the
tekilochka [14]

This sounds like a brute-force attempt.

8 0
4 years ago
Write a program to show the grade obtained by a student after he/she enters their total mark percentage. Program should accept a
DiKsa [7]
Write a program to show the grade obtained by a student after he/she enters their total mark percentage. Program should accept an input from the user and display their grade as follows Mark Grade < 90 A 80-89 B 70-79 C 60- the answer would 89 B:C cause that's then the things were alive.
3 0
3 years ago
Other questions:
  • Derek, a project manager, needs to create a plan for a software development project. Which approach or document will help him de
    15·1 answer
  • What are two most common types of microcomputers? a. IBM-style PCs and Macs c. Clients and Servers b. Mainframes and Minicompute
    14·1 answer
  • Hurry asap it’s times
    8·1 answer
  • What can Strings store
    15·2 answers
  • The computer system provides an internal clock that sends an interrupt periodically to the CPU signaling that it’s time to start
    11·1 answer
  • How to jailbreak ios 9.2 ? Is there anyway???!!!!
    12·1 answer
  • Complete the missing code in the templatepublic class Exercise09_04Extra { public static void main(String[] args) { SimpleTime t
    13·1 answer
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • 7. Four more than negative eleven times a number is 26.​
    7·2 answers
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!