1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
11

In theory, the use of a software firewall as a replacement for a network appliance can work as long as the host OS's network com

munication is routed through which type of firewall?
Computers and Technology
1 answer:
loris [4]3 years ago
5 0

Answer: Virtual firewall

Explanation: Virtual firewall is the firewall system that is implemented on the virtual environment . These maintain the protection of the  network by the filtration of the network traffic.

This firewall is used as the replacement for the network because they have easy cloud to cloud movement.They also maintain the security by disapproving of the risky communications. It is also easy tom maintain and update.

You might be interested in
. When would one use the analytic application fraud detection?
vaieri [72.5K]

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

4 0
3 years ago
60 POINTS!! WILL MARK BRAINLEST!!
polet [3.4K]

design of the network

security for the network

documentation

identifying and fixing issues

8 0
3 years ago
On which tab are the print commands in Excel 2016 accessed?
galina1969 [7]

Answer:

file (backstage)

Explanation:

edginuity 2020

3 0
3 years ago
Read 2 more answers
In cell K26, create a formula that counts the number times "Thunder" occurs in the columns containing "Names"
jek_recluse [69]

Answer:

I1 to K2: Use a formula to link the cells. Create a formula in column L that calculates the averages for each matching category in K2:

<h3>hope it's help you </h3><h3>plz mark as brain list </h3>
3 0
3 years ago
This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
Marysya12 [62]

Answer:

The languages C++, Java, Python are Object Oriented Programming languages. What this means is that we create classes and then instantiate those classes. In C++ and Java, we use the new operator to instantiate the classes. So, if we want to display some data when we try to print the instance just like we print the variables of data types like int, double, string etc, we need to define what we need to display. It is because, class are just like data types like int, double etc. But as they are defined by the developer according to his/her needs, so the developer has to define what to print when they are printed.

5 0
3 years ago
Other questions:
  • The condition, ____, entered in the criteria row of a long text field in a query window would retrieve all records where the lon
    8·1 answer
  • ___ are limited computers because they are placed inside devices which require specific computing functions
    11·1 answer
  • If you don't know whether to write too, two, or to, you should use the spell-checker to help you decide. true or false?
    7·1 answer
  • While working on a group project, you notice something does not look right in the presentation. You call a meeting with your tea
    14·2 answers
  • The following outline is used to plan a program. What is the name for this type of plan?
    7·2 answers
  • In which job role would a course in 3D modeling help with professional career prospects?
    9·2 answers
  • Define the following BASIC terms:<br> 1. Keywords<br> 2. Constants<br> 3.Variables
    8·1 answer
  • A command, such as a button or keyboard shortcut, that performs a specific task is known as a
    9·2 answers
  • Drag the right word to it’s definition
    13·1 answer
  • The term embedded system refers to any device that includes a computer chip, but that is not a general-purpose workstation, desk
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!