1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
7

When creating a firewall exception, what is the difference between opening a port and allowing an application through?

Computers and Technology
1 answer:
Mnenie [13.5K]3 years ago
6 0
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
You might be interested in
ROM is designed for _________
Sidana [21]
Computer Instructions

ROM, or Read Only Memory is used to store instructions as it retains memory even after power loss.
6 0
3 years ago
Does a call go through on the first ring when hanging up on a house phone
Alinara [238K]
I don't think so, it doesn't on my home phone.
6 0
3 years ago
In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.
jonny [76]

Answer:

focuses on a certain subject

Explanation:

it means that it focuses on that one subject and none others

Hope it helps c:

6 0
3 years ago
Five computer used in hospital
Elden [556K]

Answer:

information system, data analysis in medicine , medical laboratory computing , computer assisted medical decision making

4 0
3 years ago
In what section of the MSDS would you find information that may help if you use this substance in a lab with a Bunsen burner?
dybincka [34]

Answer:

The answer is "Fire-fighting measures".

Explanation:

This section is used to includes instructions to combat a chemicals flame. It is also known as the identify sources, which include the instructions for effective detonating devices and details for removing devices only appropriate for just a specific situation. It is the initiatives list, that is necessary destruction technology, materials; flaming inferno dangers.

8 0
3 years ago
Other questions:
  • Renee uses data from the Bureau of Labor Statistics to create a graph for a feasibility report. Which of the following should sh
    6·2 answers
  • About ___% of children score within one standard deviation above or below the national average in intelligence.
    5·1 answer
  • How can i learn about networks
    15·1 answer
  • A ________ is a virus that is triggered on a certain date.
    11·1 answer
  • Human factors is the study of:
    5·1 answer
  • Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their searc
    9·1 answer
  • Write a java program that accepts the ingredients for a recipe in cups and converts to ounces
    10·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • Recall that within our BinarySearchTree class the root variable is of type BSTNode. A BSTNode object has three attributes: info
    13·1 answer
  • Vivek wants to save the data about his grocery store in a single table. Which among the following type of databases is used in t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!