1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
11

A firewall, when properly implemented, can prevent most attacks on your system.

Computers and Technology
1 answer:
siniylev [52]3 years ago
4 0
A. it is true
all the best
You might be interested in
One property of light that makes it possible to record the image of an object with the camera
KengaRu [80]

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

7 0
3 years ago
What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and
grin007 [14]
<h2>What are the ribbon tabs in Microsoft Outlook?</h2>

The main Outlook menu has a ribbon tab with default commands. File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab. The Backstage view is where you can see information and options pertaining to the user account and settings.

3 0
2 years ago
What type of program would you use to create a personal budget?
ira [324]

Answer:

using Excel is the easiest way to create and use a budget, based on the formulas you can create to have the budget do the work for you, instead of vice versaExplanation:

6 0
2 years ago
What is the name of the general ledger that tracks all bitcoin transactions?.
motikmotik

Answer:

The Name of the General Ledger that Tracks all Bitcoin Transactions is Called the Blockchain.

A Blockchain is a Growing List of Records, known as Blocks, that are linked together using Cryptography. Each Block in a Blockchain contains a cryptographic Hash of the Previous Block, a timestamp, and also the transaction Data.

3 0
2 years ago
Read 2 more answers
A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
RideAnS [48]

Answer:

The answer is Network Operating System.

Explanation:

<em>Network OS supports network operations and functions. Such operations includes, file-sharing, permission assignments, user groups and privileges, and network security implementation that is needed. Network OS also offers patches, fixes, network monitoring and support unlike with other OS that is focusing more on interface, errors and bugs fix. To install network OS, you need to set up a client and a server computer first.  </em>

<em> To implement network OS in the given scenario, each user will be assigned in a group. Each group is categorized per department to make them communicate and share files within their members. Then there will be a bigger group which involved all departments. The reason why user must be grouped is to prevent other departments to see confidential files which is only authorized to access by certain members. Collaborations can also be conducted per group or to the whole office.  </em>

<em> Example of network OS is Microsoft Server Operating Systems.</em>

5 0
3 years ago
Other questions:
  • Your isp connects to the core routers of the internet via a _____. cable mode spine backbone satellite
    12·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • Aubrey uses the following formula to calculate a required value. Which elements of the formula use mixed cell referencing?
    13·2 answers
  • Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to
    8·1 answer
  • BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
    8·1 answer
  • what will allow you to immediately exit the program without rebooting the computer, when you realize your browser is not respond
    7·1 answer
  • Ill give alot of points if you answer: How do I get a 100 dollar ps4
    5·2 answers
  • An IT department receives a shipment of 20 new computers, and Alice has been assigned the task of preparing them for deployment
    12·1 answer
  • A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as
    6·1 answer
  • Define management styles
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!