1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
4 years ago
14

Which term is used to describe a network security device or host software that filters communications, usually network traffic,

based on a set of predefined rules?a. Snifferb. Auditorc. Hackerd. Firewall
Computers and Technology
1 answer:
morpeh [17]4 years ago
4 0

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
You might be interested in
Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
Korvikt [17]

A designer should always balance the placement of text and graphics and create room for every element to breathe. When this is followed, the flyer template will create a feeling of balance and calm.


Consider adding a border: Borders can help your flyer or newsletter stand out wherever it is placed. Selection of certain colors, Italics and ALL CAPS can draw attention to particular points in a text.


Boost contrast with style, color and font size: Always use font weight to differentiate sections of text. Many fonts offer regular, bold and light options for font weight.


Align text for a balanced look: A designer should consider using a grid system that contains intersecting vertical and horizontal lines that are often based on optimal proportions for the document’s size. Aligning text in the center will give a pleasant symmetrical look.






7 0
3 years ago
Read 2 more answers
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
garri49 [273]

Answer:

A or S most likely (I think)

7 0
3 years ago
please write out an accurate code for the question below also please explain or I'll report you ( Thanks :) )
leva [86]

Answer: hmmmm i feel like u have to move the thingy thats shooting that light down 1 unit so it can move the planet.

Explanation: moving it down 1 unit will put it at the perfect angle to push the planet. :/

6 0
2 years ago
Read 2 more answers
Which display technology was developed by apple, produces vibrant colors, and supports viewing from all angles?
Vedmedyk [2.9K]
4.5K Retina display I think that is the answer you’re looking for
3 0
2 years ago
What is the channel capacity for a teleprinter channel with a 300 Hz bandwidth and a signal-to-noise ratio of 30dB, where the no
wolverine [178]

Answer:

The answer is 2988 bits per seconds

Explanation:

Solution

Given that:

Bandwidth (B) = 300Hz

Signal to noise ratio (SNR) = 30dB

Now let C = channel capacity

Using  Deubel formula we have the following:

SNR db = 10* log (SNR)

30 =10* log (SNR)

So,

SNR =log^⁻1 (3)

SNR = (10)^3

SNR = 1000

Thus SNR =1000

Now

Applying the Shannon's equation

C = B * log₂ ( 1 + SNR)

C = 300 * log₂ ( 1 + 1000)

C = 300 * log₂ (1001)

C = 300 * 9.96

C =2988

Hence the capacity of the channel for teleprinter channel is 2988 bits per second.

8 0
4 years ago
Other questions:
  • Which group on the Home Ribbon allows you to add shapes to a PowerPoint slide?
    10·2 answers
  • Mention any six profession related to tourism
    6·2 answers
  • One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
    13·2 answers
  • Examples of apps include pop-up windows, validation of webform inpts and images that change when a cursor passes over them
    12·1 answer
  • What type of accessory device can be used to measure AC current with a VOM without opening the circuit? A. Split inductor B. Amp
    13·1 answer
  • Give an example of a situation in which shears would be the best choice and one in which scissors would suffice.
    14·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • What is the name of the formal procedure scientists use to study the world around them?
    14·2 answers
  • HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP
    12·2 answers
  • The Klez virus was a worm created to "spoof others. What is "spoofing"?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!