1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
7

What kind of firewall can block designated types of traffic based on application data contained within packets?

Computers and Technology
1 answer:
Bess [88]3 years ago
4 0

Answer:

Content Filtering Firewall.

Explanation:

  • Content Filtering Firewall can block designated types of traffic based on application data contained within the packets.
  • This ensures that objectionable websites , web portals, emails containing objectionable material can be screened.
  • This blocks the access to that particular content.
  • This helps in keeping away Malware and secure the network and systems.
  • Both hardware and software can be used to implement the content filters.
You might be interested in
When calling a function with arguments that should be modified, the __________ of those arguments are passed.
ad-work [718]

Answer:

Addresses.

Explanation:

An argument can be defined as a value that can be passed to a function.

Simply stated, an argument is a value that must be passed into a function, subroutine or procedure when it is called. This value can be passed to a function either by reference or by value.

This ultimately implies that, an argument which is also a parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

When calling a function with arguments that should be modified, the addresses of those arguments are passed. This is simply because the argument is an address or pointer in itself and as such the function parameter being called must be a pointer.

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Hence, all instance variables that have been used or declared in any superclass would be present in its subclass object.

6 0
3 years ago
Uses computers resources from multiple locations to solve ​
kodGreya [7K]

Answer:

computers are solve all things in are life

3 0
3 years ago
Read 2 more answers
Play station account
Reika [66]
I have a PlayStation as well
4 0
3 years ago
Read 2 more answers
Type the correct answer in the box. Spell all words correctly. Complete the sentence based on the role education plays to help y
CaHeK987 [17]

Answer:

what do i do??

Explanation:

8 0
3 years ago
A is a way for students to keep track of information during research
Ilya [14]
The choices are a) credible website B)search log c) Boolean operator d) online database.

The answer is, d. Online database. There are already numerous online digital tools that can aid research. Examples are readcube, mendeley, google scholar. It helps you save and organize researches as well as automatically give bibliographies according to your need like APA and MLA. These tools can hold and save different information that researchers need.
6 0
3 years ago
Other questions:
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • Easy question how the internet has impacted y’all life
    13·1 answer
  • • What is the difference between primary storage, secondary storage, and off-line storage
    10·1 answer
  • Research information technology affects on job market, career pathways, occupational outlooks in business and finance and synthe
    7·1 answer
  • Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additiona
    9·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • What is keylogging attack?
    13·2 answers
  • What is the value of numX when this program is executed? if 3 < 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Which TWO objects are likely to have SSD chips in them?
    5·2 answers
  • Please help fast
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!