1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
6

Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open o

r poorly configured firewall will not help the network defender minimize the risk from attack. True or false?
Computers and Technology
1 answer:
In-s [12.5K]3 years ago
6 0

Answer:

False.

Explanation:

Administrators showing caution in using the same tools that are used by the attackers remember that tool that can help to close a poorly configured or open firewall will help network defender and it will minimize the risk from the attack.

Hence the answer to this question is false.

You might be interested in
Jessica is working on a report for her art history class. She is using Microsoft Word for her report so that she can incorporate
Lana71 [14]

Answer:

Clicking the F4 button

Explanation:

The function keys or F keys are in most cases lined along the top of the keyboard and labeled F1 through F12. These keys act as shortcuts, performing certain functions.

The F4 button is a quick way to repeat the last command /action carried out.

For Jessica to continue applying this same style to additional headers, all she needs to do is click the Function Button F4 at the new location where she wants to apply Heading 1 Quick Style.

Other functions of the F4 button are:

  • Alt+F4 closes the program window currently active in Microsoft Windows.
  • Ctrl+F4 closes the open window or tab in the active window in Microsoft Windows.
8 0
3 years ago
Read 2 more answers
Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
egoroff_w [7]

Answer:

Option A is correct.

Explanation:

He attaches the second 1 Gigabyte 240 pins DIMM for his system the overall RAM will be up around 2 Gigabytes. System is fitted with Intel Core 2 Dual 3-GHz cpu as well as three 240 pins DIMM ports on the motherboard. Transforms on a system, just 1 Gigabytes of RAM is seen through that RAM count.

Thus, the following issue is much more probably to be the failure to correctly grab that RAM.

5 0
4 years ago
A data dictionary is sometimes described as "the database designer's database" because it records the design decisions about tab
MrRa [10]

Answer:

True is the correct answer for the above questions.

Explanation:

  • A data dictionary is used to hold the structure and definition of the database. It is because it is used to hold information about the database or operational database.
  • It is a set of schema through which the user can understand the structure of the database. It can be used to define the metadata also. The metadata detailed the data of a database.
  • The above question-statement also wants to states about the same which is described above which is the definition of the data dictionary. Hence it is a true statement.
4 0
3 years ago
which of these is a placeholder in a document into which variable data is inserted during the process of a mail merge?
Margarita [4]

Answer: C. Merge Field.

The Merge Field is a placeholder that holds the variable data that will be inserted into the main document during a mail merge procedure. The columns in a document may represent the categories of information. The Rows represent the records of the different columns. The computer counts a row of data to be a single record.

7 0
3 years ago
Read 2 more answers
Imagine your making directions easier for someone to go from any is city to another us city. Choose any 2 cities, and then Using
AnnyKZ [126]

Answer:

\huge\bold\red{Yes}

6 0
3 years ago
Other questions:
  • What is achieved through xylography
    7·2 answers
  • All resources are limited. Which of the following is NOT a resource?
    11·1 answer
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • Susan is a bookstore owner who maintains sales records in a spreadsheet. She wants to highlight the records that show sales in e
    14·1 answer
  • Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
    7·1 answer
  • What is the purpose for using proper markup language
    8·2 answers
  • What are the advantages of using ICT jn our society?​
    8·2 answers
  • I WILL GIVS BRAINLIEST IF U ANSWER THIS
    9·1 answer
  • Write a program that get
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!