1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
8

How does a firewall provide network security

Computers and Technology
1 answer:
ehidna [41]3 years ago
8 0
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
You might be interested in
What is a flowchart and write it's work​
Artist 52 [7]

Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Explanation: brainliest plz!

3 0
3 years ago
Type the correct answer in the box. Spell all words correctly. Complete the sentence below that describes an open standard in vi
Anika [276]

Answer:

digital

Explanation:

Today, video production has become digital, and all playback devices work on the open standard known as digital technology.​

8 0
3 years ago
An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about
kozerog [31]

Answer:

B

Explanation:

6 0
3 years ago
Read 2 more answers
In one sentence, how would you sum up the internet?
Slav-nsk [51]

Answer:

an informational system

Explanation:

6 0
3 years ago
Read 2 more answers
Explain the ten characteristics of a digital computers​
Paul [167]

Answer:

The major characteristics of computers are the following:

Speed : A powerful computer is capable of executing about 3 million calculations per second.

Accuracy : A computer's accuracy is consistently high; if there are errors, they are due to errors in instructions given by the programmer.

Reliability : The output generated by the computer is very reliable as long as the data is reliable.

Memory/Storage Capacity : The computer can store large volumes of data and makes the retrieval of data an easy task.

Versatility: The computer can accomplish many different things. It can accept information through various input-output devices, perform arithmetic and logic operations, generate a variety of outputs in a variety of forms, etc.

Automation: Once the instructions are fed into computer it works automatically without any human intervention.

Diligence: A computer will never fail to perform its task due to distraction or laziness.

Convenience: Computers are usually easy to access, and allow people to find information easily that without a computer would be very difficult.

Flexibility: Computers can be used for entertainment, for business, by people who hold different ideals or who have varied goals. Almost anyone can use a computer, and computers can be used to assist with almost any goal.

<em>I hope it helps you!!!!</em>

6 0
3 years ago
Other questions:
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • When inserting a fly in animation what is the first step in the process?
    9·1 answer
  • Consider the scenario below and determine the most likely source of the problem. A user reports that her or his printer is not r
    13·2 answers
  • Pick one of the following scenarios and
    6·1 answer
  • What makes software engineering an engineering discipline and what makes software engineering different from other engineering d
    15·1 answer
  • List and describe each of the activities of technology
    11·1 answer
  • C#
    10·1 answer
  • Help PLEASE ILL MARK as brainlest
    11·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!