1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
5

Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi

rewall can protect a network from attack. Why is this solution?
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
3 0

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

You might be interested in
(iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
Svetlanka [38]

Answer:

(b) 64000

Explanation:

Assuming that the "Memo" being mentioned is a Microsoft Access memo field, it can hold up to 64,000 characters, even in the more recent version of the application where the "Memo" is now know as the "Long Text" field.

According to microsoft.com, "In earlier versions of Access, we used the Memo data type to store large amounts of text... the Long Text field works the same as the Memo field of old... [it] can only display the first 64,000 characters."

<em>Please put "Brainliest" on my answer if it helped you out the most!</em>

<em>(Further Reading) If you're still confused, I suggest you search up the following:</em>

<em>- Microsoft Access Long Text character limit</em>

7 0
2 years ago
What are the steps for inserting an internal link?
julia-pushkina [17]

Answer:

=

Worksheet

Ctrl + Enter

Explanation:

4 0
3 years ago
Read 2 more answers
When she manages a software development project, Candace uses a program called __________, because it supports a number of progr
alexandr402 [8]

Answer:

PLS programming language supporting.

Explanation:

7 0
3 years ago
Describe two differences between landscape mode and portrait mode. Respond in 2-3 complete sentences.
Mice21 [21]

Answer:

they just are different

Explanation:

3 0
3 years ago
Read 2 more answers
The modulus ( % ) actually gives you the ___________ of an integer division problem.
Svetlanka [38]
The answer is (e) sum
7 0
4 years ago
Other questions:
  • If it can be applied, the least-damaging recovery option is ________.
    10·1 answer
  • The ________ method displays a message to the user and contains one button.
    6·1 answer
  • 3. SmartArt can be used to create that highlight relationships between two items.
    15·1 answer
  • Do the police check your mobile device during police checks?
    10·2 answers
  • I don't understand how to write code for this in Java using nested for loops only. The official question is: write a program tha
    8·1 answer
  • The first step in the information processing cycle is _____, which involves entering data into the computer.
    8·1 answer
  • If you were any type of fnaf charater who would you be and why?
    10·2 answers
  • What part of the meat help you identify the less tender cuts​
    13·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
  • What is the difference between margin and padding property?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!