1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
11

Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into

a computer​ system? A. Reverse marketing B. Firewall C. Malware D. Encryption E. Outsourcing
Computers and Technology
1 answer:
MrRa [10]3 years ago
7 0

Answer:

B. Firewall

Explanation:

Firewall, just like encryption prevents unauthorized entry into a computer. However, Firewall can be implemented in both hardware or software form; or even a combination of both.

You might be interested in
The _________ in an internet are responsible for receiving and forwarding packets through the interconnected set of networks and
raketka [301]

Answer:

routers

Explanation:

<h2><em><u>Fill in the blanks</u></em></h2>

The<u> routers </u> in an internet are responsible for receiving and forwarding packets through the interconnected set of networks and making routing decisions based on knowledge of the topology and traffic/delay conditions of the internet.

3 0
3 years ago
What is the main advantage of Ram<br><br>​
andre [41]

Answer:

to get milk

Explanation:

gjvuvuvjvvjvjvvjvjvhvjvub

7 0
4 years ago
What is the oldest malware victor
arsen [322]

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

7 0
3 years ago
You are studying at the library and someone at your table has some great study material. both of you have an ipad with you. you
myrzilka [38]
C.apple domain is to use the personal sharing files from one computer to another computer
3 0
3 years ago
Which animation principle is applied to ‘sell’ the beginning of the character jump?
Sunny_sXe [5.5K]
Anticipation I think so but I’m not sure:)
3 0
2 years ago
Other questions:
  • The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * sym
    7·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • Which of the following attributes of a website indicates a more reliable source for information?
    8·1 answer
  • The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users t
    8·1 answer
  • In 2d design, form makes what possible?
    15·1 answer
  • The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:
    13·2 answers
  • What is the correct order of the phases of the software development process?
    14·1 answer
  • To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
    9·2 answers
  • Question 2
    7·1 answer
  • Explain why it is important that the device registration is the last thing that is done in the initialization routine of a devic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!