1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
5

Which term is used to describe a network security device or host software that filters communications, usually network traffic,

based on a set of predefined rules?
Computers and Technology
1 answer:
tensa zangetsu [6.8K]3 years ago
4 0

This term could apply to a router.

You might be interested in
The divBySum method is intended to return the sum of all the elements in the int array parameter arr that are divisible by the i
iragen [17]

Answer:

The complete method is as follows:

public static int divBySum(int[] arr, int num){        

     int sum = 0;

     for(int i:arr){

         if(i%num == 0)

         sum+=i;

     }

     return sum;

   }

Explanation:

As instructed, the program assumes that arr has been declared and initialized. So, this solution only completes the divBySum method (the main method is not included)

This line defines the method

public static int divBySum(int[] arr, int num){        

This line declares and initializes sum to 0

     int sum = 0;

This uses for each to iterate through the array elements

     for(int i:arr){

This checks if an array element is divisible by num (the second parameter)

         if(i%num == 0)

If yes, sum is updated

         sum+=i;

     }

This returns the calculated sum

     return sum;

   }

8 0
3 years ago
Which is the most common drive letter where Windows stores most data and programs? A. B. C. E.
Effectus [21]

The most common drive letter where Windows stores most data and programs is "C".<span>
<span>In the beginning the computers used to have two floppy drives which were named as A and B. Later when hard drives added up to the technology, it was written as "C" because A and B were floppy drives already :) </span></span>

4 0
3 years ago
Read 2 more answers
Complete the sentence.
Hatshy [7]

the http acquires the ip address

Explanation:

this is because it is the default protocol

6 0
3 years ago
Read 2 more answers
Which of the following is not one of the four criteria for evaluating websites?
Flura [38]

Answer:validity

Explanation:

Because it dont sound right

5 0
3 years ago
While developing a network application, a programmer adds functionally that allows her to access the running program without aut
PIT_PIT [208]
A way into the program without authentication would be a backdoor method.
8 0
2 years ago
Other questions:
  • In a five-choice multiple-choice test, which letter is most often the correct answer?
    7·2 answers
  • Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically? A. Focus B. Sweep
    9·2 answers
  • Select the correct answer.
    9·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
    14·1 answer
  • Assume an ArrayList and a Linked List each contain 10,000 items. Which operation is performed fastest
    14·1 answer
  • Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumbe
    10·1 answer
  • The profile picture that you plan to use to market your professional brand on social media networks should feature you only.
    12·1 answer
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
  • What symbol do we use to assign a value to a variable or constant in algorithms?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!