1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
11

Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into

a computer​ system? A. Reverse marketing B. Firewall C. Malware D. Encryption E. Outsourcing
Computers and Technology
1 answer:
MrRa [10]3 years ago
7 0

Answer:

B. Firewall

Explanation:

Firewall, just like encryption prevents unauthorized entry into a computer. However, Firewall can be implemented in both hardware or software form; or even a combination of both.

You might be interested in
Help me with this please​
Gnesinka [82]
Different types of connections are..

-A network is two or more devices connected through links.

-There are two possible types of connections: point-to-point and multipoint.

-A point-to-point connection provides a dedicated link between two devices.

Explain the different types of topologies

-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.

-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology

-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop 

-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates 

-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

Different type of networks

-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.

-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).

-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.

-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.

-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office 

-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.

-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.

-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.

-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.

Explain your own understand about protocol and standards

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

explain layers in OSI model

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Explain layers in tcp/ip model

Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.

what are the peer to peer processing

In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data
5 0
3 years ago
Suppose that the following elements are added in the specified order to an empty binary search tree: Lisa, Bart, Marge, Homer, M
Alecsey [184]

Answer:

Pre-order: Lisa, Bart, Homer, Flanders, Marge, Maggie, Smithers, Milhouse

In-order: Bart, Flanders, Homer, Lisa, Maggie, Marge, Milhouse, Smithers

Post-order: Flanders, Homer, Bart, Maggie, Milhouse, Smithers, Marge, Lisa

Explanation:

The required orders are mentioned.

4 0
3 years ago
What is the advantage of breaking your application’s code into several small procedures?
Sholpan [36]

Answer: For better code management and modularity

Explanation:

An application consist several lines of code so when we break an entire code into several small procedures it becomes easy to maintain and look for errors while debugging. This process also is part of good code writing and hence easy to manage our code during testing and debugging phases of application development.

3 0
3 years ago
Which of the following is powered by energy from earth's interior ?
butalik [34]
I think the correct answer from the choices listed above is option D. It would be plate tectonics that is powered by energy from Earth's interior since it is the only choice that is underneath the surface of the Earth. Hope this answers the question. Have a nice day.
3 0
3 years ago
Which of the following should businesses and organizations do to promote a safe work environment?
nlexa [21]
<span>The correct answer should be A.Hold managers, supervisors, and employees for meeting their own responsibilities. The policies should be changed more often than every 10 years, and definitely the workers should be involved because the workers know better what is problematic than managers who sit in offices in suits and aren't exposed to dangerous activities.</span>
8 0
3 years ago
Other questions:
  • Answer this question please
    6·1 answer
  • A typical serial cable has
    13·1 answer
  • In mathematics, the factorial of a positive integer n, denoted as n! , is the product of all positive integers less than or equa
    10·2 answers
  • So when i try to click on an assignment to answer it the ask a question thing pops up and i can't exit out of it. I've tried rel
    10·2 answers
  • Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year
    14·2 answers
  • A research team is studying parallel computing. They want to run parallel process without having to use multiple processors. How
    7·1 answer
  • Default tab stops are set in word every _______ inch. a. ¾ b. ½ c. 1 d. ¼
    7·1 answer
  • What is the setting an alarm clock output??
    10·1 answer
  • Give me two reasons why return statements are used in code.
    10·2 answers
  • Write a program with a "function" named "getMinFromInput()" that reads a list of integers from the keyboard and returns the smal
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!