1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
14

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. bastion host tra

nsitional iron-clad proxy
Computers and Technology
1 answer:
devlian [24]3 years ago
4 0

Answer: Bastion host

Explanation: Bastion host is type of computer which resist the attacks happening on a network particularly. It mostly works between the internet and interior network. It assures that the interior computer network remains undamaged due to any type of threat. It can also be considered that bastion host behave as the gateway between internal network and firewall as well.

You might be interested in
1 MB equals to how many GBs? Or 1 GB = how many MBs? i want to know how many MBs equal a GB, or how many GBs equal a MB; i'm get
Deffense [45]
Approximately 1,000 MBs are in a gigabyte
5 0
4 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
6
Lisa [10]

Answer C in the paragraph group on the home tab

8 0
3 years ago
What are some examples of everyday coding? (ex: phones, computers, etc.)
Maslowich
Im guessing you mean where coding is used?
pretty much anything with lights or a button

but, examples:
(some) watches
(newer) cars
planes
boats
credit cards (using one requires code to be ran)
Cash registers
(some) safes
Alarm Clocks
Routers
ATMs
eBooks
Cellular Sattelites
Weather Sattelites
Energy Grids
Water Plants
Sewage
Anywhere where mail is sorted

8 0
4 years ago
Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
12345 [234]

Answer:

A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. ... A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive.

LAN stands for Local Area Network. WLAN stands for Wireless Local Area Network. ... WLAN connections are completely wireless. LAN network is a collection of computers or other such network devices in a particular location that are connected together by communication elements or network elements.

Easy and Cheap Communication: Data and messages can easily be shared with the other computer connected to the network. Centralized Data: The data of all network users can be stored on a hard disk of the central/server computer. This help users to use any computer in a network to access the required data.

Explanation:

<em>I </em><em>don't</em><em> know</em><em> if</em><em> </em><em>it's</em><em> </em><em>correct</em><em>,</em>

<em>so </em><em>hope </em><em>it </em><em>helps</em>

4 0
3 years ago
Other questions:
  • _____ run horizontally and _____ run vertically in a table.
    7·1 answer
  • In which type of land contract does the seller earn interest on the difference between what the seller owes on an existing loan
    14·1 answer
  • A technician suspects a network card is not working. Which tool should the technician use to test the network card?
    14·1 answer
  • Flowcharts allow you to more easily clarify among multiple potential solutions to a problem to see which solution is best.
    5·1 answer
  • What happens in the process represented by the flowchart ?
    14·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    7·1 answer
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    9·1 answer
  • Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​
    14·1 answer
  • Explain what the loop does and what the result of executing it will be.
    7·1 answer
  • A computer hacker trying different combinations of characters to crack a password is a ________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!