To enhance security, firewall rules can be used along with a proxy server to ____.
A. limit Internet access to only network administrators at all times
B. allow for internal users to bypass the proxy server at all times
C. enable external users to access any client computer directly
D. enable internal users to send outbound requests only at certain times
Answer: D
You might also like to view...
________ are data items whose values cannot change while the program is running.
A) Literals B) Variables C) Fixed data D) Integers E) None of the above
________ is a program that extends the operations a computer can perform beyond the hardwired machine instructions.
Fill in the blank(s) with the appropriate word(s).
Match the following parts of the Windows desktop screen to their description:
I. desktop II. taskbar III. Computer icon IV. Windows sidebar V. notification area A. contains the Start button B. shortcut to drives, files, and folders C. optional area on the right edge where gadgets can be placed D. basic screen from which Windows and applications are run E. running programs that are not necessarily displayed in a window are shown here
Shifting a cell's contents to the right or left to help it stand out from the row above or below is known as ________.
Fill in the blank(s) with the appropriate word(s).