1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
13

In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
8 0
Windows Firewall is a  security application used to block unauthorized access to the computer and to permit authorized data communications to and from your computer.<span>
In the windows firewall, any rules preceded by a gray checkmark have not been enabled. </span><span>Those rules with a gray checkmark are disabled and they are not used by Windows Firewall.</span>
You might be interested in
How were images captured before the invention of the camera?
xeze [42]

Answer:

The British inventor Fox Talbot produced his first successful photographic images in 1834, without a camera, by placing objects onto paper brushed with light-sensitive silver chloride, which he then exposed to sunlight.

Explanation:

5 0
2 years ago
why is it when you put earbud aux cords in a phone or computer they sound weird until you move the aux cord? Then it is somehow
AfilCa [17]

Answer:

that might just be the headphone cord itself or it might be the port on the pc/phone

Explanation:

i had this happen with my old droid razr hd i thought it was the aux cord on my speaker and head phones but i used the same things on a friends phone and they worked just fine and this might be do to an old  or broken port on the phone /c my phone headphone port got used almost everyday and it was just the port you can replace this on some tech or you could just use bluetooth if the tech doesent have it buy and adapter.

            hope this helps!!!

4 0
2 years ago
Its not letting me change my email, any way to fix this? Must include steps and how to fix this. (I am using a school email) ANS
AlexFokin [52]
You see, you just aren’t philosophical enough to understand an email. You don’t change the email, it changes you.
3 0
2 years ago
When a program lets the user know that an invalid input choice has been made, this is known as _________________.
Leto [7]

Answer:

The correct answer for the given question is " input validation"

Explanation:

Input validation is also known as data validation which is used for validate or test the user input .

The example of input validation in c++ programming

#include <iostream> // header file

using namespace std;  

int main()  // main function

{

 int a1; // variable declarartiomn

 cout << "Enter the age: ";

 cin >> a1;

 if(a1> 18) // validate user input

 {

  cout << "You are eligible for vote :";

 }

return 0;

}

In this program we input a age from user and validate this user input that .If user enter age > 18 then it will eligible for vote.

output

21

You are eligible for vote

5 0
3 years ago
Which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?
Vinil7 [7]

Answer:

D. 100 volts

Explanation:

Electrostatic discharge (ESD) can be defined as a swift or sudden discharge of static electricity between two (2) objects coming in contact. An electrostatic discharge occurs between the two objects because the objects are having a different amount of electrons and charge. Thus, when they come in contact it results in a huge buildup of electromagnetic field known as an electrostatic discharge (ESD).

Also, voltages from an electrostatic discharge (ESD) are capable of destroying the internal components of a computer. Generally, a 100 volts ESD would be the minimum to short circuit a computer's hardware components.

Additionally, an electrostatic discharge (ESD) can be prevented through the use of an antistatic wrist strap, antistatic bags etc.

3 0
3 years ago
Other questions:
  • Java Homework:(The Person, Student, Employee, Faculty, and Staff classes) Design a class named Person and its two subclasses nam
    9·1 answer
  • A security administrator is required to submit a new csr to a ca. what is the first step?
    11·1 answer
  • Wich type of operating system is usually used in personal computers
    6·2 answers
  • Bytes are typically represented with a lowercase b and bits with an uppercase B.<br> true or false
    7·1 answer
  • Which technology concept uses computer resources from multiple locations to solve a common problem?
    11·2 answers
  • What is the reason that friction is present in surface to surface contact?
    5·1 answer
  • Dispositivo de computo
    5·1 answer
  • Who invented the Bluetooth device​
    12·1 answer
  • Circuit pruning occurs only before puberty.<br> O True<br> O False
    9·2 answers
  • What is incorrect about the following code? Suggest a possible revision of the code to correct the error.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!