1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
9

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Computers and Technology
2 answers:
Free_Kalibri [48]3 years ago
7 0
Firewall

-------------------------------
stira [4]3 years ago
7 0

Answer:

Firewall

Explanation:

Generally in English, firewall can be described as a wall or barrier that is meant to prevent fire from spreading.

In computing, firewall refers to a network security system or  a piece of computer software that is meant or used to prevent unwanted data to gain access to the system.

The primary function of firewall is to monitor and regulate entry and exist of network traffic based on the security rules that have all already been determined or put in place. It does this by putting in place a barrier among the external network that are trusted or the ones that are not trusted like the internet.

Therefore,  firewall is software that acts as a filter to prevent unwanted packets from entering a network.

You might be interested in
Which area would a Gaming Designer fall under? Research and explain why you think so. Make sure to site your source and where yo
pshichka [43]

Answer: Game Artist, Game Designer or Game Programmer.

Explanation:

All of which fall under a “Game Designer”

5 0
3 years ago
1. Perform the following Binary Additions 101101 + 10100 *
USPshnik [31]

Answer:

1.         carry   1  1  1

                      1  0 1 1 0 1

                      +  1 0 1 0 0

                       ------------------------

   Answer: 1  0 0 0  0 0 1  

2.         carry  1 1  1 0 1  1  

                     0 1 0 1 0 0 1 1

                  + 0 1 1  1 0  1  1 0

                  --------------------------

    Answer: 0 1  1 0 0 1 0 0 1

3.                   1 0 1 1 0 1

                    -   1 0 1 0 0

                   -------------------------

       Answer: 0 1 1 0 0 1

4.                      1 1 0 0 1 0 1 1

                      -    1 0 1 0 1 1 0

                     -----------------------------

        Answer:   01 1 1 0 1 0 1

Explanation:

In Binary addition when you add 1 + 1 = 0, carry over the 1, i.e 10

in Subtraction when you subtract 0-1 = 1,  brow 1 from left side, resulting in -1 carried over.

3 0
3 years ago
Read 2 more answers
A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
mariarad [96]

Answer: D. Choose ClearPass or the other external captive portal option for the guest WLAN.

Explanation:

The Aruba Instant On mobile app allows the configuration and monitoring of a network from anywhere. It provides an affordable solution to small businesses and they're reliable and secure.

Based on the criteria given in the question, the network administrator can meet the criteria by choosing a ClearPass or the other external captive portal option for the guest WLAN.

8 0
3 years ago
A group of researchers is designing an experiment to test whether meditation helps people fall asleep faster. The researchers se
storchak [24]

Answer:

Option 4 is the correct answer.

Explanation:

<h2>Randomization eliminates lurking variables from the experiment.</h2><h2 />

Randomization is adopted due to the fact that it removes lurking variables. By lurking variables we mean the extraneous variables which are unknown but can effect the other variables that are of interest.

Randomization is necessary in experiments to ensure that the generated result may not be biased or misleading.

<h3>I hope it will help you!</h3>
3 0
3 years ago
If you cannot find a template on your computer that was appropriate for your task, what should you do?
DanielleElmas [232]

Answer:

The correct option for this question is File.

Explanation:

5 0
3 years ago
Other questions:
  • Can someone please help me withe these questions its really urgent
    5·1 answer
  • Match the following tasks with their appropriate timing.
    8·1 answer
  • Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. Tr
    7·1 answer
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • 7) The small slots on the front, back, or side of your computer that allow you to connect devices (such as a keyboard, mouse, or
    11·1 answer
  • A GPO component that’s an Active Directory object stored in the System\Policies folder. The GPC stores GPO properties and status
    14·1 answer
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
    10·2 answers
  • What is a decryption key?​
    8·1 answer
  • Input images into a computer
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!