Which ports needs to be open in order for a user to access the internet?

1 Answer

Answer :

I believe that the concept of "open ports" applies on the serverside; meaning that the server will respond on certain ports. Sobasically, you need none on the side of the end-user.

Related questions

Description : Is it true that if you don't log off from a site, you leave certain ports open allowing access to your 'puter?

Last Answer : My bank's website specifically warns you to not only log out, but to close the browser window due to possible security breaches. I always assumed it meant someone might access your records on that site, ... on sites with sensitive personal data on them (financial, medical, etc.). Perhaps I'm wrong?

Description : Which of these statements highlights a valid privacy concern when working with large data sets? I. Data from multiple sources could be linked together to discover someone's identity. II. For access to location-based services, a ... . I and II only B. I only C. I and III only D. I, II and III

Last Answer : B. I only

Description : Hardware is worthless without the real controller of computer which is: a) Ports b) A User c) Software d) None of These

Last Answer : c) Software

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access ... The final value of semaphore will be: (1) 0 (2) 1 (3) -1 (4) -2 

Last Answer : Answer: 1

Description : How do I open gaming ports on my Belkin router?

Last Answer : is there a thing called DMZ on the website. under a tab named application & gaming?

Description : Ports of the Baltic Sea remain open for trade even during winter because - (1) It lies in the tropical belt (2) North Atlantic Drift, a warm ocean current flows in the region. (3) Local winds keep it warm. (4) Western disturbances cause abrupt rise in the temperature.

Last Answer : (2) North Atlantic Drift, a warm ocean current flows in the region. Explanation: It is due to the North Atlantic Drift which is a warm water ocean current, an extension of the Gulf Stream. This current keep the ports along the coasts warm enough to stay open year around.

Description : 8096 has ___ general purpose I/O ports, Port 2 includes ______ of the following i) two quasi-bidirectional I/O lines ii) two output lines iii) four input lines iv) open drain outputs a) 4, i, iv b) 6, ii, iii c) 4, i,ii,iii d) 6, i, ii, iv

Last Answer : c) 4, i,ii,iii

Description : 8096 has ___ general purpose I/O ports, Port 2 includes ______ of the following i) two quasi-bidirectional I/O lines ii) two output lines iii) four input lines iv) open drain outputs a) 4, i, iv b) 6, ii, iii c) 4, i,ii,iii d) 6, i, ii, iv

Last Answer : c) 4, i,ii,iii

Description : Ports of the Baltic Sea remain open for trade even during winter because (1) It lies in the tropical belt. (2) North Atlantic Drift, a warm ocean current flows in the region. (3) Local winds keep it warm. (4) Western disturbances cause abrupt rise in the temperature.

Last Answer : North Atlantic Drift, a warm ocean current flows in the region.

Description : The four important ports of the West Coast of India, from South to North, in that order, are (a) Kandla, Mumbai, Goa, Cochin (b) Goa, Mumbai, Cochin, Kandla (c) Mumbai, Kandla, Goa, Cochin (d) Cochin, Goa, Mumbai, Kandla

Last Answer : Ans: (d)

Description : Why does my printer say it needs user intervention?

Last Answer : What is the answer ?

Description : If a user needs to download a record can he or she can click Download and save the image files to CD portable drive or any file location on a computer?

Last Answer : True.

Description : My daughter needs the most user friendly phone services for hearing impaired listeners.?

Last Answer : The Federal Relay is a good phone service for the hearing impaired. They are a governmental run company so they are the most trusted of these types of phone service providers.

Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... particular location. D. You can run different campaigns based on the location of the mobile use

Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location

Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... location. D. You can run different campaigns based on the location of the mobile user.

Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location.

Description : Acceptance testing means A. Testing performed on a single stand - alone module or unit of code B. Testing after changes have been made to ensure that no unwanted changes were introduced C. ... the needs of the organization and end user. D. Users test the application in the developers environment

Last Answer : C. Testing to ensure that the system meets the needs of the organization and end user.

Description : Mac question: Best steps for manually erasing user data if I don't have access to an install CD?

Last Answer : So far I’ve manually Secure-deleted the following: all my user docs, my keychains, and anything in application support that would have stored sensitive info (like my Firefox data and Mail directory). What else should I delete?

Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?

Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.

Description : My ipod won't let me access my mail? It says "The user name or password for "imap.apple.yahoo.com" is incorrect" and I know my password and username are both correct.

Last Answer : you should try the apple support forums.

Description : Where can I access a free online user manual for a T-Mobile myTouch?

Last Answer : Most cell phones come with a free user guide in the form of a pamphlet. If you are looking for an online version, the T-Mobile website offers a free version.

Description : Where can I access a free online user manual for a T-Mobile G2x with Google?

Last Answer : All owener's manuals should be accessible through the phone manufacturer's website. Use a desktop/laptop (not mobile device) to search the website for your specfic manual. The manual's usually pop ... or update your Adobe reader.(http://cache.g2.t-mobile.com/files/T-Mobile_G2_User_Guide.pdf)

Description : Where can I access a free online user manual for a Sharp FX?

Last Answer : You can download your free online Sharp FX manual at www.manualusersguide.com. They will tell you everything about the phone from how much it weighs to operating and wi-fi.

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : The user generally applies _________ to access mainframe or super computer? (A) node (B) terminal (C) desktop (D) None of the Above

Last Answer : (B) terminal

Description : Briefly explain the difference between Public (public), Friend (internal), and Private (private) access levels as they apply to user-defined types and members.

Last Answer : In user-defined types, Public (public) classes can be instantiated by any element of the application. Friend (internal) classes can be instantiated only by members of the same assembly, and Private ( ... the same assembly, and Private (private) members can be accessed only from within the type. 

Description : The need for assurance services arises because: a. There is a potential bias in providing information. b. Economic transactions are less complex than they were a decade ago. c. There is a consonance ... . d. Most users today have access to the system that generates the financial statements they use

Last Answer : There is a potential bias in providing information

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : What is true about 2D barcodes? A. barcodes cannot scan vertically B. barcodes cannot scan horizontally C. A mobile user can scan barcodes in the environment to access associated information. D. Both B and C

Last Answer : C. A mobile user can scan barcodes in the environment to access associated information

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : What types of operating systems let more than one user access the same resources at the same time?

Last Answer : Multiuser/multitasking.

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.

Last Answer : A. Social Engineering.

Description : Microsoft Office Access 2007 includes a set of database ………… which are designed for specific business needs. -Technology

Last Answer : Microsoft Office Access 2007 includes a set of database templates which are designed for specific business needs.

Description : Serial access memories are useful in applications where A) Data consists of numbers B) Short access time is required C) Each stored word is processed differently D) Data naturally needs to flow in and out in serial form

Last Answer : Answer : D

Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C

Last Answer : iv) Both A & C

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Serial access memories are useful in applications where a. Data consists of numbers b. Short access time is required c. Each stored word is processed differently d. Data naturally needs to flow in and out in a serial form

Last Answer : d. Data naturally needs to flow in and out in a serial form

Description : Bart's Appliance Centre owner Ron Bart has access to a great deal of information generated both inside and outside the firm but much of this information is presently going to waste ... A)marketing research focus B)marketing knowledge bank C)marketing information system D)data-gathering system

Last Answer : C)marketing information system

Description : Do cruise ports have '"layovers" like airports?

Last Answer : Most cruises allow passengers to disembark at intermediate stops and do some sight seeing. It is the passenger’s responsibility to get back to the ship in time before it sails.

Description : Computer hardware savvy Jellies: Can I fix these malfunctioning USB ports?

Last Answer : Can you link to the specific laptop? It is quite possible the port on the left is USB 2.0 and the ones on the right are USB 3.0. Or it could be the other way around. By any chance do the female USB plugs have different colors around them?

Description : Are there any USB ports that allow the device to be plugged into it right-side-up and upside-down?

Last Answer : I doubt it since there is a physical key' blocking insertion in the wrong direction. That's part of the standard. Personally I don't think that's flawed. You want your wires each connected to the correct thing ... . Why doesn't it just know what the signal is? What do we have to have a wire for ?

Description : Why do DVI ports vary so much?

Last Answer : Perhaps there was a lack of standardization regarding the DVI ports unlike, say, MIDI.