1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
10

A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers

and email servers but cannot enter the secure network.
Computers and Technology
1 answer:
pychu [463]3 years ago
4 0
Firewall
Dont forget to thanks and give brianliest.
You might be interested in
What is a tag in an HTML document?
Llana [10]

Answer: HTML is considered as the Lingua franca of the net that is a simple mark up language used for the purpose of web publishing for creating text and images. This can be viewed by any of the member and can be used within any browser. There is no need of special software for creating HTML pages and moreover the learning of HTML is pretty easy.

Explanation: If you need more help go follow me at dr.darrien

- thank you

3 0
3 years ago
Read 2 more answers
This term is also called live, or hot, which means that a voltage is present and it can cause an electrical current. Any time an
tangare [24]
B. Energised although this is not as common
3 0
3 years ago
What hand glove is used to prevent electric shock and why​
Ostrovityanka [42]

Answer:

Insulated gloves because their made of synthetic rubber.

Explanation:

7 0
3 years ago
Read 2 more answers
Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(
agasfer [191]

Answer:

The program to this question can be given as:

Program:

#include <stdio.h>  //include header files

#include<math.h>

int main()    //main method  

{        

   double treeHeight = 0.0;         //declare variables

and assign value

   double shadowLength = 0.0;  

   double angleElevation =  0.11693706;

   // (0.11693706 radians = 6.7 degrees) convert number into angle.      

   shadowLength = 17.5;  

treeHeight = shadowLength * tan(angleElevation);   //convert number into angle

   printf("Tree height: %lf\n", treeHeight);   //print value.

   return 0;  

}

Output:

Tree height: 2.055778

Explanation:

In the above C language program firstly we include the headers. In this header file, we include a (math.h) header file this file helps to use the math function. Then we declare the main method in the main method we declare the variable that is given in the question that are treeHeight, shadowLength , angleElevation. All the variable datatype is double because it stores the floating-point value. Then we apply the formula that is  treeHeight = shadowLength * tan(angleElevation). In this formula, the treeHeight variable holds the value. Then we print the variable value for print the double value we use the lf(that is long float).

7 0
3 years ago
Why should we be concerned about HVAC systems when discussing security?
lana66690 [7]

Answer:

 HVAC is stand for the heating, ventilation and the air conditioning system that basically perform various type computer management and operation system. It also helps to improve the productivity of the system.

 As, HVAC system is very concerned about the security as it basically include various types of toxic chemical in the environment that include various types of criminal and terrorist activities and natural disaster.

The HVAC systems are easily cause various accidental cases due to its complexity nature. It also performing various types of function in the management sector like maintenance, system updating function an remote controlling maintenance.

4 0
3 years ago
Other questions:
  • Jessica finds out that the government introduced a new trade policy that will increase import tariffs. She calls for a meeting o
    15·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • Which of the following will you select as X in the following series of clicks to lay the title over a chart: Chart Title box &gt
    14·1 answer
  • Password combined with pin used as an authentication requirement is an example of:
    6·1 answer
  • Which of the following statements opens the file info.txt for both input and output? a) dataFile.open("info.txt", ios::in &amp;&
    11·2 answers
  • A group of users in a small publishing office want to share large image files in a common folder with high availability. Which o
    15·1 answer
  • The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
    14·1 answer
  • Where can formatting features be found ?! Need help asp !‍♀️
    9·1 answer
  • You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you ca
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!