1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
5

Which term is used to describe a network security device or host software that filters communications, usually network traffic,

based on a set of predefined rules?
Computers and Technology
1 answer:
tensa zangetsu [6.8K]3 years ago
4 0

This term could apply to a router.

You might be interested in
When you add an rss feed to hootsuite publisher, posts from blogs and websites you designate will be?
Cloud [144]

All answers are correct.

Source and explanation: certificationanswers.com/en/category/hootsuite-platform/

8 0
3 years ago
PLLZZZZZ HELP I WILL GIVE BRAINLIEST IF ANSWER IS RIGHT
Aloiza [94]

Answer:

The answer is candyCost = int(input("How much is the candy?"))

Explanation:

3 0
3 years ago
Read 2 more answers
To complete a forensic disk analysis and examination, you need to create a ____.
just olya [345]
<span>To complete a forensic disk analysis and examination, you need to create a </span>report.
8 0
3 years ago
Plz answer me will mark as brainliest ​
victus00 [196]

Answer:

Application

Explanation:

Application software comes in many forms like apps, and even on computers. The software is most common on computers of all kinds while mobile applications are most common on cellular devices.

3 0
3 years ago
Read 2 more answers
NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for li
Andrews [41]

Answer:

a and b. 250.4(A)(1) Note

Explanation:

4 0
3 years ago
Other questions:
  • Failure to verify information can lead to?
    10·1 answer
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • Enter key is also known as Return key. (True or false)
    13·2 answers
  • The physical parts of the computer are known as?
    14·1 answer
  • Electricity fact topic
    10·2 answers
  • What are copyright laws? Authority to reprint an original work as long as it's not for profit Entitlement to use and sell anothe
    15·2 answers
  • You are in the windows power shell window and decide to encrypt folder which of the following command do you use
    7·1 answer
  • What is a photographic print made from a negative image?
    7·1 answer
  • Social media first became popular due to which development?
    8·1 answer
  • the php function that is executed is a connection to a database cannot be made is the____ function. die | isset| end | connect.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!