1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
15

A firewall relies on or a that determine what traffic should or should not be allowed to pass through

Computers and Technology
1 answer:
likoan [24]3 years ago
5 0
A firewall determines what external network traffic(internet) should or should not be allowed to pass internal network(computer). A firewall is network security that protects software and hardware from untrusted sites that may have viruses, worms, and bugs that are detrimental to the computer.
You might be interested in
Choose the answer.
Alik [6]
A home network aswell business networking would use a Router to connect the lam and internet all together
3 0
2 years ago
Read 2 more answers
Breaking down a problem to find the solution is called:
velikii [3]
I would say B.......
7 0
3 years ago
Molly, an end user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
ale4655 [162]

Answer:

The answer is D and E

Explanation:

There is no much difference between a port replicator and a docking station. These two terms are used interchangeably and both serve the same purpose of connecting portable computers with other devices with little or no effort. The main difference between the two is that a port replicator provides a solution for all laptops through USB while a docking uses a propriety connector to the computer. Users can use a docking station and a port replicator to convert their laptop PCs into desktop computers when at home or in the office.

7 0
3 years ago
Which recovery method allows users to back up their personal files to an external drive or network share without administrative
GarryVolchara [31]

Answer:

File history

Explanation:

File history recovery method  allows users to back up their personal files to an external drive or network share without administrative assistance. File History is a backup program that holds your personal files saved in the directories archives, desktop, favorites, and Contacts. It searches the file system regularly for changes, and copies modified files to a different location.

8 0
3 years ago
If Twitter were to exclusively use e-mail, collaborative computing, and other computer connections to connect geographically sep
sweet-ann [11.9K]

Answer:

Virtual is the correct answer for the above question.

Explanation:

A Virtual organization is a collection which is used to connect the geographical people, organizational units, employees, individuals and groups for some communication purpose. Virtual means that there is some existence like physically but it is not physically present. So the organization also connects the person and gives the real scenario with the help of some software for communication.

The question states that if twitter uses email and other computing connections to connect people globally then it comes in the Virtual department because it follows the concept of the virtual department. Hence Virtual is the correct answer.

5 0
2 years ago
Other questions:
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • How do computers find servers, requests information from the server, and receives it?
    12·1 answer
  • Mobile apps known as news _________ collect articles from a variety of sources and present them to you in a magazine-style forma
    7·2 answers
  • Technology is often discovered by accident
    5·1 answer
  • An ironworker standing 30 feet in the air is safe wearing a full body harness that is not tied off
    15·2 answers
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
  • Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Most effective way of closing email is<br>​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!