Answer:
This is not a good solution
Explanation:
Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.
restart.is done after the computer is passed through configuration
Answer:
Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.
- Be Careful With Your Tone.
- Be Accurate and Factual.
- Search First, Then Ask.
- Don't Use Sarcasm Freely.
- Be as Polite as You Are In Person.
Answer:
Explanation:
Apply a slide layout
1 . Select the slide that you want to change the layout for.
2 . Select Home > Layout.
3 . Select the layout that you want. The layouts contain placeholders for text, videos, pictures, charts, shapes, clip art, a background, and more. The layouts also contain the formatting for those objects, like theme colors, fonts, and effects
Answer
File names should describe the content of the file.
Explanation
File names are set of words which are used to uniquely identify computer files which are stored in a file system. This helps one to know the contents of the file which you want to find. When you name these file names you use necessary characters you use descriptive words so that you dont have hard times when searching for them. The naming also is determined by the file system you are using because different systems impose different restrictions on the length of the file names and the allowed characters within file names.