1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
3 years ago
14

You can block logical ports from invaders and make your computer invisible to others on the internet by installing ________. a f

irewall a packet sniffer antivirus software a packet filter
Computers and Technology
1 answer:
GalinKa [24]3 years ago
6 0
<span>A firewall is the best choice. This will help protect your computer from being seen on a network and being invaded by snoopers who are wanting to do damage to your system or files. Having a firewall is the first line of defense against hacking and sabotage.</span>
You might be interested in
How do you create a reference page in apa format with all websites?
Gre4nikov [31]
Use Cite This For Me's APA citation generator to create a reference page in APA format with all websites.
6 0
3 years ago
Which option describes a balanced slide?
Umnica [9.8K]

Answer: a slide with a size 18 font and five images

Explanation:

the text isnt that big to overpower the images and vise versa

4 0
3 years ago
Which of the following is not a key component of a structure?
valentina_108 [34]
D. Enumerations! Because I know that is NOT a leg compentent of a structure
5 0
3 years ago
List the six external parts of the computer system
Elina [12.6K]
1. Monitor
2. Modem
3. system unit
4. Mouse
5. Speaker
<span>6. Printer and also a keyboard I'm not sure which you should take out though lo</span>
6 0
4 years ago
You are the network administrator for Corpnet.com. You install the Windows Server Backup Feature on a Windows Server 2012 R2 fil
Vsevolod [243]

To ensure that multiple backups of the server are available for restores you should Modify the frequency of the scheduled backup.

a. Modify the frequency of the scheduled backup.

<u>Explanation:</u>

To backup system normal and good practices schedule every day either different folder, which is further classified day of a week name. For example Sunday, Monday, Tuesday Wednesday, Thursday, Friday Saturday backup schedule will once a week.

Suppose Monday backup schedule run once a week at midnight of every Monday, same away Tuesday backup schedule run once a week at midnight of every Tuesday. If we schedule weekly one day folder end user will have 6 last days folder so that end user can restore the data any point of time.

7 0
4 years ago
Other questions:
  • The set of appearance choices for files and folders is known as the
    7·1 answer
  • Which of the following resources can be used by an OS to communicate with hardware? (Select 2)
    11·1 answer
  • Completed the given flowchart using the algorithm steps which is given in wrong order. 1.Input time 2.Stop 3.Print "Good morning
    8·1 answer
  • Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this eviden
    6·1 answer
  • Because a chart is _______, it can be dragged to another area of the worksheet.
    13·1 answer
  • When Jimmy Fallon is outside the White House, his persona is mostly O A. humble O B. stern O c. gloomy O D. wild​
    9·1 answer
  • Write an algorithm (pseudo-code) that takes an unsorted list of n integers and outputs a sorted list of all duplicate integers.
    6·1 answer
  • A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
    5·2 answers
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
  • What are the different types of topology?​ in details
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!