1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
13

In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
8 0
Windows Firewall is a  security application used to block unauthorized access to the computer and to permit authorized data communications to and from your computer.<span>
In the windows firewall, any rules preceded by a gray checkmark have not been enabled. </span><span>Those rules with a gray checkmark are disabled and they are not used by Windows Firewall.</span>
You might be interested in
Hard disk works on the following technologies: (i) Technology used within the hard drive to read &amp; write data to the drive a
Alex787 [66]

Answer:

The green-blue circuit board you can see in the first photo includes the disk controller, a circuit that allows the computer to operate the drive's mechanisms and read/write data to and from it. ... A small hard drive typically has only one platter, but each side of it has a magnetic coating

Explanation:

8 0
2 years ago
PLZ HELP 60 points!! Minor changes to objects which only take effect at render time are called:
slega [8]
It’s literally all b
5 0
2 years ago
Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5 GiB of RAM, program
muminat

Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

<h3>How is virtual memory used instead of RAM?</h3>

A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.

With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.

Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

Learn more about virtual memory from

brainly.com/question/13088640

#SPJ1

6 0
1 year ago
The ip address 221.1.10.53 /24 is a what type of address?
jekas [21]
It is a class C address.  Class C covers all addresses in the range 192.0.0.0 to 223.0.0.0.  The /24 represents the number of network bits in the address so we can work out that the subnet mask of this address would be 255.255.255.0.
8 0
3 years ago
Match the parts of the software applications with what they do.
Lady_Fox [76]

1-h

2-f

3-e

4-g

5-d

6-c

7-b

8-a

4 0
2 years ago
Other questions:
  • The class Date has a single constructor that accepts the integer value: a month- (1 for January through 12 for December), a day
    13·1 answer
  • Given the String variables name1 and name2, write a fragment of code that assigns the larger of the two to the variable first (a
    6·1 answer
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • William is an HR manager in a textile-manufacturing firm. He is creating a file on the hours each employee worked during the las
    6·2 answers
  • What is a traditional tool used to align and mark vertical points from top to bottom?
    10·1 answer
  • WILL GIVE BRAINLIST IF ANSWER IS RIGHT AND YOU TELL ME HOW YOU GOT YOUR ANSWER (dont copy and past from a site)
    10·2 answers
  • 1. Which of the following cables are used in networking? Check all that apply.
    8·2 answers
  • What is the full form of the OS?​
    15·2 answers
  • This is an image of the ...........................Topology.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!