1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
4 years ago
7

When creating a firewall exception, what is the difference between opening a port and allowing an application through?

Computers and Technology
1 answer:
Mnenie [13.5K]4 years ago
6 0
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
You might be interested in
How many fields can be sorted when sorting data in Word tables? up to 3 fields 1 field at a time up to 4 fields 2 fields at a ti
ValentinkaMS [17]

Answer:

up to 3 fields

Explanation:

You can sort using up to 3 fields at a time within a Ms Word table, as you can see in the image I join.  For each criteria column, you can chose to sort in ascending or descending order.

It's a bit surprising to see such capability in a word processing document.  You'd expect that in Ms Excel, which is a spreadsheet.

8 0
3 years ago
Read 2 more answers
The Internet is not a good place to connect with people when looking for a job.
djyliett [7]
This is kind of in opinion , i think it is true as people could be on the internet to kidnap or hurt others. It depends on what you think
8 0
4 years ago
In 3-4 sentences, write a note to a friend describ
sladkih [1.3K]

you can copy and paste your text.

7 0
3 years ago
Read 2 more answers
PLS HURRY!!<br> Look at the image below!
Lady_Fox [76]

Answer:

Line 2: for numF in [3, 5]

Line 1: for numE in [2, 6]

Line 3: print(numE, numF)

Explanation:

From the outputs, the first number of the first output is 2. This means that <em>numE in [</em><em>2</em><em>, 6]</em> would be on the first line.

The second number of the first output is 3, concluding that <em>numF in [</em><em>3</em><em>, 5]</em> is within a nested loop, meaning it would be on the second line.

This leaves <em>print(numE, numF)</em> on line 3.

We can go through the lines step by step to check if we have placed them in the correct order:

Code

for numE in [2, 6]:

 for numF in [3, 5]:

   print(numE, numF)

During the first iteration, numE = 2 and numF = 3.

Output: 2, 3

Since [3, 5] is in a nested loop, we need to finish iterating all of its numbers before numE moves to the next number, so:

numF moves to 5, numE stays at 2.

Output: 2, 5

Since we have finished iterating through [3, 5], numE moves to 6 and numF starts back at 3:

Output: 6, 3

numE still stays at 6 and numF iterates to 5 since [3, 5] is in a nested loop:

Output: 6, 5

The outputs match the outputs on the sheet, meaning we have correctly placed the code in order.

Hope this helps :)

5 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
Other questions:
  • Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
    13·1 answer
  • What skills and characteristics do you think would be necessary for a lighting board operator to be successful?
    8·2 answers
  • A data mart differs from a data warehouse in that: Group of answer choices it deals with a particular component or functional ar
    13·1 answer
  • If you reset your iPhone will it delete everything including your Apple ID information
    9·2 answers
  • Who like fortnite??????
    12·2 answers
  • What’s the difference between the logical and physical structure of a file? What are the advantages of not having an application
    15·1 answer
  • ______________ in SONET are analogous to the ________________ of T-carriers.
    7·1 answer
  • given the variables temperature and humidity, write an expression that evaluates to true if and only if the temperature is great
    11·1 answer
  • 20 ponts!!!dorothy has made a website for her hair salon on a wysiwyg editor. she wants her website to appear on the first page
    6·1 answer
  • _________ in online education refer(s) to how fairly the particular needs of particular groups of students are met.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!