1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
7

What kind of firewall can block designated types of traffic based on application data contained within packets?

Computers and Technology
1 answer:
Bess [88]3 years ago
4 0

Answer:

Content Filtering Firewall.

Explanation:

  • Content Filtering Firewall can block designated types of traffic based on application data contained within the packets.
  • This ensures that objectionable websites , web portals, emails containing objectionable material can be screened.
  • This blocks the access to that particular content.
  • This helps in keeping away Malware and secure the network and systems.
  • Both hardware and software can be used to implement the content filters.
You might be interested in
Special keys that allow you to use the computer to perform specific functions
Pavel [41]

Answer:

Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...

8 0
3 years ago
Identify the flaws / limitations in the following ConvertToNumber method:
lions [1.4K]

Answer:

Flaws and limitations identified in this program includes;

1.There was a not necessary usage of variable retrieval. Would have made use of canConvert.

2. Looking at the program, one will notice numerous typos. One of which is the fact that in JAVA we make use of Boolean instead of bool.

3.We rather use Integer.parseInt in JAVA and not Int16, cant make use of Int16.

4. The exception cant be printed

5. JAVA makes use of checkConversion instead of convertNumber as used in the program.

6. It cant work for decimal numbers, 0 and big integers.

Explanation:

See Answer for the detailed explaination of the flaws and limitations identified in the program.

4 0
3 years ago
Raymond has to send a number of large documents to his charterer accountant for filing his taxes. Which email etiquette should R
CaHeK987 [17]

Raymond should compress the files, and then at the very least ask what would be the appropriate time to email the attachment. It is important to practice good etiquette when using email. If you are sending an email that has attachments, always make sure to mention it in the body of the email. Raymond should also ZIP or compress his large attachments before sending them. This will make them easier to send.

4 0
3 years ago
Read 2 more answers
What is generation of compyter​
gavmur [86]

Answer:

the change that computers go through

Explanation:

like 6 generation

6 0
3 years ago
Read 2 more answers
In describing a new problem you are having with your computer, your boss interrupts and states, I had the same problem last week
Anna007 [38]

Answer:

Stereotyping

Explanation:

According to my research on information technology, I can say that based on the information provided within the question it can be said that your boss is exhibiting Stereotyping which could be inhibiting his creative problem-solving approach. Just like in psychology, stereotyping is over-generalized belief about a particular something. Which in this case since his boss saw a similarity in the problem with another problem he previously had, he automatically assumed he knew the cause and how to fix it.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Nonvolatile in the context of data storage means ________________. a. the data can't be changed in a data warehouse. b. the data
    11·1 answer
  • What do radio telescopes use to gather and focus radio waves?
    14·2 answers
  • WILL UPVOTE NEED ANSWERS ASAP i have till 4:30
    12·1 answer
  • Given the following code fragment, what is the data type of roster[9] .name? struct student { string name; double gpa; }; studen
    5·1 answer
  • Please help will mark brainiest
    8·1 answer
  • Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of n
    11·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • Advanced Electronics has employees who use a company website to share work. By posting on the website, employees are
    7·1 answer
  • Liquid-liquid extraction is best suited to separate a mixture of compounds when:
    9·1 answer
  • Borrowing money affects both assests and owners equity. True or false?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!