1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
3 years ago
7

To deny traffic destined to a specific tcp port you will need to apply a __________ access control list.

Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
4 0
The correct answer for the fill-in-the-blank is [user]3
You might be interested in
When solving for K, when cell potential is known, what is one of the first steps to follow?
BaLLatris [955]
Yes it is D like the other person said
5 0
3 years ago
What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it
oksian1 [2.3K]

Answer:

"Recoverability" is the appropriate solution.

Explanation:

  • The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated.
  • This technique is used to reinstate make informed even without system failures.
8 0
3 years ago
Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
daser333 [38]

Answer:

Time taken to travel from one track to the next = 0.08ms

Initial track= 15     0

4      (15-4)*(0.08)= 0.88

40     (40-4)*(0.08)= 2.88

35      (40-35)*(0.08)= 0.4

11       (35-11)*(0.08)= 1.92

14       (14-11)*(0.08)= 0.24

7         (14-7)*(0.08)= 0.56

----------------------------------------------

Total seek time=0.88+2.88+0.4+1.92+0.24+0.56=6.88ms

Explanation:

We caculate the seek time for each request, and then add them together to find the total seek time. The final track number for the current request becomes the current track of next request, and this process is repeated till the last request is processed.

4 0
3 years ago
I am programming and i want to find the amount of move functions i need to complete the full square. the square is 65 by 70 circ
Ahat [919]
Not to be rude, but this is elementary school. How would anyone know this?
8 0
3 years ago
WILL GIVE BRAINLIEST!!!!!!!
lisov135 [29]

Answer:

Ac

Explanation:

Ac maybe.Idk sorry.

8 0
3 years ago
Other questions:
  • A range in which a measuring instrument or controller does not respond is the
    12·1 answer
  • An intranet is an external network.TrueFalse
    15·1 answer
  • ----------HELP WITH 3 QUESTIONS FOR 30 POINTS!!!---------
    6·1 answer
  • The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
    11·1 answer
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • It's possible to __________ out of a loop if the user has entered an incorrect value that would cause an error or a problem with
    11·1 answer
  • Money money money money
    8·2 answers
  • Draw AND, OR, XOR and XNOR gates with truth table and logic gates.<br><br>.​
    11·1 answer
  • Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
    15·2 answers
  • PLS HEEELLLP ASAP, DONT JOKE
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!