1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
4 years ago
5

Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi

rewall can protect a network from attack. Why is this solution?
Computers and Technology
1 answer:
zavuch27 [327]4 years ago
3 0

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

You might be interested in
Given a 13 bit address bus, how many unique addressed could be accessed? g
valina [46]
2^13 = 8192 addresses
8 0
3 years ago
To annotate a document with a remark for another reviewer to address, select the _____ feature.
Gala2k [10]
<span>To annotate a document with a remark for another reviewer to address, select the Comments feature. 

In both Excel and Word, you can go to the toolbar and select review and you will see "New Comment." Select the word (in Microsoft Word) or the cell (in Microsoft Excel) add click on the "New Comment". </span>
3 0
3 years ago
Which part of a resume gives an account of past jobs and internships?
kirill [66]

Answer:

Internships section above your Work History section

Explanation:

5 0
3 years ago
What is are example of an engineered item?
zysi [14]
Trains, Cars, Boats, Airplanes
3 0
3 years ago
Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm th
Makovka662 [10]

Answer:

The memory allocation algorithm that is used to place the processes given is the <u>First Fit Algorithm </u>

Explanation:

The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.

For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)

It will work as follows (recall that the memory partitions are in order and must remain so):

A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next

B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100  KB, 350 KB, 200 KB, 750 KB, 125 KB), next  

C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB)  next

D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB)  next

E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB,  200KB, 17KB, 125KB)

One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.

Cheers

5 0
3 years ago
Other questions:
  • DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.
    6·1 answer
  • A medical assistant at a local hospital is exploring the Start Menu of his/her computer and various Windows programs/application
    6·1 answer
  • The market is in <br> until the price of goods reflects equal supply and demand.
    10·1 answer
  • WILL MARK BRAINILY!!
    9·2 answers
  • Consider a direct-mapped cache with 256 blocks where block size is 16 bytes. The following memory addresses are referenced: 0x00
    7·1 answer
  • Write a Python function that join the two string and print it ​
    14·2 answers
  • Which of these describes, in increasing order, the file sizes of the same image in different formats? Group of answer choices
    6·1 answer
  • How do you believe cryptocurrency work shape the next 10 years
    6·1 answer
  • What is the size of BIOS?
    13·2 answers
  • Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!