1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
5

Which term is used to describe a network security device or host software that filters communications, usually network traffic,

based on a set of predefined rules?
Computers and Technology
1 answer:
tensa zangetsu [6.8K]3 years ago
4 0

This term could apply to a router.

You might be interested in
Which amendment discussed in the unit do you think has the greatest effect on your life? Why?
lora16 [44]
The 13th amendment (freed the slaves) for me because I am black
6 0
3 years ago
What customization feature can you use to create a cohesive look and feel for your presentations
yan [13]

B.Custom Themes

I have to add text so I can post this answer

5 0
3 years ago
Jjhb ft fv tuning Denise l Debbie
Vitek1552 [10]
What








What the debbie



7 0
3 years ago
Employees don't have to comply with PPE requirements if they feel the PPE isn't necessary for the particular task they performed
ANTONII [103]
You know what...ITS IS VERY VERY FREAKIN FALSE!!
7 0
3 years ago
Read 2 more answers
You are purchasing a new printer. Which of the following is the most important requirement?
OlgaM077 [116]

Question↓

You are purchasing a new printer. Which of the following is the most important requirement?

Answer↓

A. Is the printer compatible with your computer's operating system?

If The Printer is Not Compatible With your Computer you will not Be able to Use Therefore, you Will have to buy a New One.

xXxAnimexXx

Hope this Helps! ^ω^

7 0
2 years ago
Other questions:
  • How can vlan hopping attacks be prevented on a network?
    10·1 answer
  • Technician A says that in any circuit, electrical current takes the path of least resistance. Technician B says that while this
    11·2 answers
  • Which payment type is best if you are trying to stick to a budget?
    10·2 answers
  • Writе thе dеclaration of a doublе pointеr namеd avеragе
    10·1 answer
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • What is the HCF of smallest prime number and the smallest composite number?​
    12·1 answer
  • True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Arr
    15·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!