1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
3 years ago
7

To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl

y necessary.
True / False.
Computers and Technology
1 answer:
mariarad [96]3 years ago
4 0

Answer:False

Explanation: Firewall is the system that provide security to the network from any unauthorized or illegal accessing. It works for both hardware  and software system .

It has certain configuration of integration checking of files and system in the system to maintain the security on regular basis. Therefore firewall configuration is important for the hardware and software and should be implemented on regular basis for the protection of the system.

Thus the given statement is false.

You might be interested in
Create a class template for a class named GeneralStackthat holds
Elan Coil [88]

Answer:

data member as an array named stack of size 50 to store certain elements Three member functions i.e. push(type) to add elements in the Stack, pop() to ...

3 0
3 years ago
Harvey is creating a presentation for his school project. He wants to have the same look on all the slides of his presentation.
Dimas [21]
<h2>Answer:</h2>

<u>Theme option in the design tab</u>

<h2>Explanation:</h2>

After opening his slides in power point he must click on the Design Tab and then selecting a theme from various options that come in front of him. He can select any theme and then click apply to all. This will allow him to apply the same theme over all his slides of presentation.

6 0
4 years ago
Read 2 more answers
Types of lines in dressmaking
Shtirlitz [24]

Answer:

table of contents/ straight line/horizontal line/diagonal line/zigzag line/curved line(softly)  curved line(fully)  thin line

Explanation:

your welcome

5 0
4 years ago
Karlie wants to eat a good breakfast before taking a test
babymother [125]
Yum sounds like a good idea
7 0
4 years ago
Read 2 more answers
A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
Allisa [31]

Answer: Stealth/Tunneling Virus

Explanation: Stealth or tunneling virus are the virus which are responsible for attacking a computer system which causes the problem in the functioning of the operating system by manipulating files, creating partition etc.

These viruses try to avoid or prevent the anti-virus scans for the detection any sort of virus or error . They act to prevent any malfunction detection by taking charge for the anti-virus operation.

5 0
3 years ago
Other questions:
  • In a typical system design specification, the _____ section contains the complete design for a new system, including the user in
    5·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • Write a code block to encode strings from original messages, using our custom encoding. To do so: Initialize a variable called c
    6·1 answer
  • A tripod head can move vertically or horizontally. What term describes these movements?
    15·2 answers
  • Help i give 20 shekel
    9·1 answer
  • The two main methods of verification
    6·1 answer
  • The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standa
    15·2 answers
  • One benefit of open source software is that it
    9·1 answer
  • Which computer peripheral is used when you would like to use a DVD or CD?
    12·2 answers
  • 1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constru
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!