1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
8

An administrator has added a firewall within an Azure virtual network. What do we know for sure about the firewall?

Computers and Technology
1 answer:
slavikrds [6]3 years ago
5 0

Answer:

its a host based firewall

Explanation:

because the administrator put it ntentionally and the only way do disable the firewall is by signing in as the admin (if you're the admin) and turn it off manualy

or if you're not the admin, ask them to do so.

You might be interested in
Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
vampirchik [111]

1. At Work--and at Play

At the 2005 E3 trade show, the big news was the extreme capabilities of the next Xbox and PlayStation consoles--these machines will more closely resemble home media computers rather than game devices. And with flat-screen monitors that double as TVs and cell phones that double as PDAs and MP3 players, the convergence of tech for work and play may reach a crescendo in the next few years.

What does this mean for your business? Maybe you'll return to the heady dotcom days and offer your employees a game console for break times. After all, you can also use it to play back video and digital photos in meetings. And a cell phone that plays music could be handy in traffic, but one that plays MP3s of the latest business audio book can also keep you informed on the go. So don't pooh-pooh the latest consumer devices as having no potential for business use--with a little imagination, you can mix business and fun.

2. Prepare to Get Mini

The mini computer packs a full-fledged PC into a package the size of a laptop battery, and can be used at your desk or as a portable computer--they're smaller than the slimmest laptops, and they don't have the limited capability of a PDA. And they come equipped with all processing power, memory and ports you'd expect in a regular computer, minus the bulk and weight. Some have docking cradles and can be used as tablets, while others feature slide out screens, but they're all small enough to be able to slip into a purse or pocket. Unfortunately, they're still cost prohibitive: A mini PC can cost as much as $4,000, whereas a regular computer with the same processing power can be purchased for less than $500. At this point, mini PCs are really a fashion statement for the ultimate early adopter, but keep your eyes peeled because once prices drop, they could change the way that everyone does business out of the office.

3. Next Gen Cell Phones

3G, or third-generation, cell phone networks are popping up all across the country. And they're not just for making phone calls. Current releases offer a variety of capabilities, including on-demand video services that let you watch streaming video clips on your phone, built-in camcorders that record video, still cameras to snap pix, MP3 players to play your favorite music, and mini SD cards, Memory Sticks or Multimedia Memory Cards to save and transfer it all between devices. 3G Smartphones sport mini keyboards to save your thumb from cramping up during marathon text message sessions, feature Windows Mobile OS and can be Bluetooth or Wi-Fi-enabled. GPS-equipped cell phones also just made their debut. Use them to get driving directions while on the road or to keep track of employees.

4. Inventory Gets Smart

Radio Frequency Identification (RFID) embeds tiny data-packed radio transceiver chips into all kinds of goods and containers. Like a talking bar code, an RFID chip can talk to a scanner several feet away and tell it far more than a printed label, even from inside an unopened carton. The technology has been around for decades, but has only recently come into use. The Department of Defense and Wal-Mart are already taking advantage of RFID. Once pricing gets friendlier and some standards are worked out, the technology will trickle down to smaller retailers and businesses.

"When transportation companies begin reading carton and pallet tags as shipments are loaded, transferred and delivered, this could provide smaller retailers with the same level of tracking that UPS and FedEx provide," says Bert Moore, director of IDAT Consulting and Education, a Pittsburgh technology consulting firm. "Better tracking will allow managers to better schedule work flow and inventory."

3 0
3 years ago
Which of the statements is most likely true about the differences between the basic version and premium version of StreamPal
romanna [79]

Answer:

I

Explanation:

8 0
3 years ago
Read 2 more answers
a bus is full of passengers. if you count them by either twos, threes, or fives, there is one left. if you count them by seven t
ruslelena [56]

Answer:

91

Explanation:

You know that the number must end in 6 or 1 to get a left over of 1 when divided by 5. Six won't work because  2  divides evenly into a number ending into 6.

So the number ends in 1.

21 doesn't work because 3 divides into 21 evenly.

31 doesn't work because 7 does not divide into it.

41 doesn't work. 41 is prime. 7 won't divide into it.

51 is divisible by 3

61 seven does not evenly divide into 61.

71 seven leaves a remainder of  1

81 7 leaves a remainder.

91 Answer

4 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to inter
koban [17]
Interpersonal skills.
6 0
3 years ago
Read 2 more answers
Other questions:
  • WILL MARK BRAINLYIST
    15·2 answers
  • Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to
    14·1 answer
  • Once i have internet connection do i need anything else to surf the web
    6·1 answer
  • Which of the following processes should angel use to merge cells a1:d4 to create a title
    15·1 answer
  • A company produces coffee makers. The labor cost of assembling one coffee maker during the regular business hours is $2.65. If t
    11·1 answer
  • Which king, after finding the decree of Cyrus giving the Jews permission to return and build the Temple, ordered the end of oppo
    11·2 answers
  • Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subj
    7·1 answer
  • Stages of reverse engineering
    8·1 answer
  • Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
    13·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!