1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
14

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. bastion host tra

nsitional iron-clad proxy
Computers and Technology
1 answer:
devlian [24]3 years ago
4 0

Answer: Bastion host

Explanation: Bastion host is type of computer which resist the attacks happening on a network particularly. It mostly works between the internet and interior network. It assures that the interior computer network remains undamaged due to any type of threat. It can also be considered that bastion host behave as the gateway between internal network and firewall as well.

You might be interested in
A group consists of 10 kids and 2 adults. On a hike, they must form a line with an adult at the front and an adult at the back.
blsea [12.9K]

Answer:

b. 2.9!

Explanation:

There are is a mistake in the question.

Suppose the group consist of 10 kids and 2 adults, the number of ways in which they can form the line is:

= 2! 10!

= 2× 1× 10!

= 2.10!

But since that is not in the given option.

Let assume that the group consists of 9 kids and 2 adults, the number of ways in which they can form the line is:

No of ways the kids can be permutated =  9 ways

No of ways the adult can be permutated  = two ways.

Thus; the number of ways in which they can form the line = 2! 9!

= 2 × 1× 9!

= 2.9!

6 0
3 years ago
Which of the following is a group of email names and addresses used for mass distribution of a message?
Jet001 [13]

Answer:

Option D is the correct answer for the above question.

Explanation:

Email list (as the name suggests) is defined as the set of an Email address. It is also the group of address which is needs for message distribution because an Email address is the only necessary part to send the mail which is also called the message. When a user wants to send the mass Email or message then he needs a list of email which can be filled at the "TO" or "CC" or "BCC" part of the compose mail and it can be able to send the mass message.

The above question asked about the list which is useful for the mass message then the answer is an Email list which is stated from the option D. Hence option D is the correct answer while other is not because--

  • Option A states the actor list which is not required to send the mail.
  • Option B states the client list which is not required to send the mail.
  • Option C states the chat list which is not required to send the mail.
3 0
3 years ago
The picture above is a description of the C code below. Please modify the C below so that it uses FILE HANDLING (fopen, fputs, f
siniylev [52]

Answer: i just learned something new.

Explanation:

3 0
3 years ago
How many fixes are available for Adobe Photoshop CS4 (64 Bit)?
arsen [322]

Answer:

There are three (3) fixes in adobe cs4.

Explanation:

Adobe photoshop cs4 is a version of the creative cloud's professional graphic applications used to edit pictures, design interfaces, make graphical illustrations, draw and animate the drawings, etc.

It can be installed in several computer operating system platforms like linux, mac and windows. The adobe photoshop cs4 doesn't support the windows installation and might run into several issues. There are other issues in other supported platforms, but unlike for windows, there are three fixes for these problems.

4 0
3 years ago
Ross has to create a presentation for his class but can't decide on a topic. What should he do?
mylen [45]
Resheach thngs that instrest him and that fit the guidlines
6 0
3 years ago
Read 2 more answers
Other questions:
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • ______ means locating a file among a set of file​
    14·1 answer
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • If anybody knows what does this mean I will answer any questions for you and plz answer this right plz what does that envelope w
    5·2 answers
  • What is my favorite color?<br> Red<br>Orange<br>Yellow<br>Blue <br>Gold<br>Silver
    13·1 answer
  • Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so
    11·1 answer
  • Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
    10·1 answer
  • LeonRoyal15 if anyone plays fortnite
    10·2 answers
  • To extract detailed and comprehensive responses from your client, use the _____ questioning technique.
    5·2 answers
  • An MP3 player is an example of which of the following types of computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!