You can block logical ports from invaders and make your computer invisible to others on the internet by installing ________. a firewall a packet sniffer antivirus software a packet filter

Answers

Answer 1
A firewall is the best choice. This will help protect your computer from being seen on a network and being invaded by snoopers who are wanting to do damage to your system or files. Having a firewall is the first line of defense against hacking and sabotage.

Related Questions

__ is/are the amount of blank space between lines of text in a paragraph

Answers

Indents? Double Space? one of those

Answer:

The correct answer is line spacing

Explanation:

Which of the following is not an operating system?



A.Linux


B.Leopard


C.Microsoft Windows


D.Internet Explorer

Answers

D. Internet Explorer is a web browser application.

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a ______________________ which will ____________ the Astroliner off the ground and into the air to about 20,000 feet.

Answers

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a 747 aircraft. Which will tow the Astroliner off the ground and into the air to about 20,000 feet. 60 years ago,first demonstration of the basic concept of towing an un-powered aircraft behind a powered aircraft and then releasing it for autonomous flight. It was first accomplished with the German ME321 transport glider. 

Which commas is used to combine two or more cells together into one cell

Answers

The command is Merge & Center
This command could be easily found in the toolbar of your excel.
If you execute this command in two different cells, those cells will be merged into one larger cell and the content in that cells will be placed exactly in the middle of the combined cell (measures according to combined cells' length)

A ___________ lists all possible packet switches and gives a next hop for each.

Answers

routing table A routing table is what a network device uses to figure out where packets are supposed to be sent.

Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?

Answers

Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200

With network management software, a network manager can ____.

Answers

Manage all network resources such as users, computers, printers, rights etc.

Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be connected to the network. This circuit board is the _____.

fiber optic
network interface card
network operating system
peripheral

Answers

If it's an ethernet network:  network interface card

Which component of a computing device drains the battery the fastest?

Answers

The LCD panel of the computing device drains the battery the fastest.This component  drains approximately 43% of the total battery life. Since the display is the biggest power drain in order to maximize the battery life of your computing device you should enable Power saver mode and make sure it's set to turn off the display quickly after inactivity. 

An array of strings , names , has been declared and initialized . write the statements needed to determine whether any of the the array elements are null or refer to the empty string . set the variable hasempty to true if any elements are null or empty-- otherwise set it to false .

Answers

#Python

hasempty = False
for name in names:
   if ( not name ):
      hasempty = True
      break  # speed things up

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

Answers

Virus                     

On the home ribbon, what do you use to change the font size of characters in a cell

Answers

The font tab in the home ribbon

are the ways data represented and transmitted with computers law of nature or law of man?

Answers

The way in which data are transmitted and represented with computers is done through the law of man because it is the man who determines through his technological knowledge the rules that must be established for the introduction and transmission of computational data. The data are represented by the use of codes under norms and lines according to a system of which it is studied and designed with a target.

Someone who buys a song online and copies it for friends is violating
A)privacy rights.
B)ethical rights.
C)appropriate Internet use.
D)intellectual property rights.

Answers

Answer:

I know

I gave him a 5 star by mistake

The answer is actual D

Explanation:

Music is can be property

Because it can be owned

The standard character code that represents characters from multiple languages using 16 bits is called _____.

Answers

The answer is character encoding.  It is used in a way to represent charaters and in which can be used in different or even in languages that are multipled. This type of character standard uses sixteen bits in order for it to function.

A cyberbully is someone who invades another person’s privacy by

Answers

Insulting or harassing them over the Internet
intimidating someone online with threats.

What is the difference between the RAM and ROM

Answers

ROM is data that is written to the hard drive and is not erased when the comupter is shut off

RAM is temporary data that is erased when the the computer is shut off

Is a list of variable information such as a name and address that is included in a document?

Answers

the Answer is a Data Source

When operating a computer, a user interacts with
the operating system.
a software license.
the BIOS.
application software

Answers

When operating a computer, a user interacts with application software. Thus, option D is correct.

What is the application software?

An application is a computer software package that performs a specified job directly for an end user or, in certain situations, for another application. It is also known as an application program or application software.

An application can be a single program or a collection of applications. A computer programme that responds to user input and assists users in performing personal, professional, and educational tasks is known as application software.

This programme is frequently useful since it enables you to undertake tasks that express creativity, increase productivity, and improve communication. Application software's main function is to assist the user in doing certain activities.

Therefore, option D is correct.

Learn more about the application software, refer to:

https://brainly.com/question/29353277

#SPJ2

You can use ____ arguments to initialize field values, but you can also use arguments for any other purpose.

Answers

do you need help , i think the answer is right in tha tsentence

The number of distinct values that can be represented using 5 bits is

Answers

2 to the power of 5, ie., 2^5 = 2*2*2*2*2 = 32.

Which device should be used for enabling a host to communicate with another host on a different network?

Answers

A router should be used for enabling a host to communicate with another host on a different network.

With a(n) ____ the editor, compiler, and executer are combined in the same application.

Answers

IDE, Integrated Development Environment

What is the area of a parallelogram whose vertices are A(−1, 12) , B(13, 12) , C(2, −5) , and D(−12, −5) ? Enter your answer in the box.

Answers

it should be 238 for the area

Looking at the first two vertices, A and B, we see that the x values have a difference of (-1 - 13) units, or 14 units. This gives us the base of the parallelogram. Next, we look at the difference between the y values between B and C to find the height. In this case, they are (12 - [-5] ) units, or 17 units. The area of a parallelogram is simply base multiplied by height, which is (14 * 17), or 238 square units.

Which website can help you find antivirus software?

Answers

McAfee!!! you should get it

The awser is b. i took the testo

The java compiler is able to find all programmer errors.

Answers

No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.

Which of these can be considered data?

A.facts


B.information


C.belief


D.all of these

Answers

B.Information
can be considered data

Answer:

B) Information

Explanation:

Information is data

Is a network traffic management device used to connect different network segments together?

Answers

No, network traffic management software is only concerned with the health of the Network.

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the userâs knowledge or permission.

Answers

virus










-----------------------------------

Leah deals with several file conversions every day.

Answers

That’s not a question but good for her
Other Questions
In what country and continent did the renaissance began in Which inference is most supported by the passage?wealhtheow is more interested in wealth and power than she is in the safety of her people.wealhtheow is not pleased that beowulf and his men have arrived to fight with grendel.wealhtheow is nervous speaking in front of beowulf and his men because she is afraid of them. wealhtheow has not been impressed by the men who have fought grendel up to this point? Dos elementos se encuentran en este verso "que ecos mil discurre, enzordeciendo" analiza como se representan estas dos oposiciones use prime factorization to find gcf of 57 and 27 What country claimed the largest amount of land in the America The cerebellar ________ receives somatosensory information and influences the vestibulospinal and reticulospinal tracts. dentate nucleus pontine nucleus vermis flocculonodular node intermediate and lateral zones Paula is a regular at gino's italian bistro. she likes going there because the staff always recognizes her, greets her by name, and makes her feel welcome at the restaurant, so she feels an emotional connection with the staff and the restaurant. this is an example of the ________ component of her attitude toward gino's. situational cognitive conative perspective affective Which sentence correctly identifies an adjective clause?Question 4 options:While you load the washing machine, I'll load the dryer.The paper towels that Dad bought have a flowered pattern.I had never seen a play until my grandparents took me to Los Angeles.After the tomato plants were watered, they grew much faster The average (A) of two number,M and N, is given by the formula A=m+n/2. Find the average of the two numbers 36 and 72. what state is found 45 degrees North and 100 Degrees west Charles Louis Montesquieu was a French political thinker known for his On traditional maps, Earth is represented in a flat plane, or by Euclidean geometry. However, a globe is a more accurate model that comes from elliptical geometry. How does a globe represent the fact that there are no parallel lines in elliptical geometry? The equator is not parallel to any other latitudinal lines. The North and South Poles are never connected by a geodesic. The geodesics connecting the North and South Poles never intersect. The geodesics connecting the North and South Poles intersect at both of the Poles. Read the sentence.Frank brought me a NASA guidebook for further reading.Which word is the indirect object in the sentence?a. readingb. Frankc. med. guidebook You and your friend get the same magazine. You spend $15 for twelve issues. Your friend pays $1.50 per issue but gets the first two issues free. How many issues will your friend get if he also spends $15? Players will be issued what color cards for fouls, depending on the seriousness of the penalty. Which scientist isolated the proton from the nucleus in 1919? Which muslim empire was known for its grand and well-planned capital?a.safavid empireb.ottoman empirec.mughal empire? What is the potential energy of the two-spring system after the point of connection has been moved to position (x, y)? keep in mind that the unstretched length of each spring is much less than l and can be ignored (i.e., l). express the potential in terms of k, x, y, and l? I dont know how to answer I need help to calculate (The three at the end is to the third power!)(1)3Thank you!!!!!! Steam Workshop Downloader