1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
3 years ago
8

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections

between the devices on both sides of the firewall. What type of technology is being used
Computers and Technology
1 answer:
ankoles [38]3 years ago
6 0

Answer:

Application proxying

Explanation:

Application proxying -

It refers to the safe and secure access for a security gateway , is referred to as application proxying .

It acts as a protective layer between the protected network and the network which need to be protected .

Hence , tha access to the protected network is open with the secure gateway .

Hence , from the given information of the question ,

The correct term is application proxying .

You might be interested in
When entering a formula into a cell, you begin with are calculations a spreadsheet program applies to data. are preset calculati
Ugo [173]

Answer:

When entering a formula into a cell, you begin with  an equal sign

Functions and formulas are calculations a spreadsheet program applies to data.

Functions are preset calculations within spreadsheet software.

Formulas are user-entered calculations that may contain cell references, numerical values, and preset calculations.

Explanation:

I did the assignment on Edge 2020.

7 0
3 years ago
* Describe the five components of a<br> computer
LenaWriter [7]

Answer:

Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.

5 0
2 years ago
Read 2 more answers
____ allows you to add formatting such as shapes and colors to text
Alla [95]
Css also known as cascading style sheets which is a program used to design a webpage and color in the texts of a body.
6 0
4 years ago
Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen
Leno4ka [110]

Answer:

I think it's "Carly will set the page to Page Width, and Rhianna would zoom to 150%." If Carly doesn't want to use the zoom thingy, then she probably would just change the page orentation (idk if I spelled that right). Rhianna wants to zoom in, so that's why I said that. It's either "A" or "C."

Explanation:

I hope this helps!

5 0
3 years ago
Which language would you use to create scripts that send data to a web server?
bonufazy [111]

Which language would you use to create scripts that send data to a web server?

A. HTML

<u>B. ASP</u>

C. SGML

D. CSS

5 0
4 years ago
Read 2 more answers
Other questions:
  • (Java)
    12·1 answer
  • Uploading is the process of transferring existing content stored on a server or other computer or device to your device via a ne
    8·1 answer
  • Which statement accurately compares the restart at 1 and continue numbering featured of word
    15·2 answers
  • What is entered into a cell that is typically numeric and can be used for calculations?
    9·2 answers
  • Someone places a chocolate bar near a working radar set that is used to locate ships and airplanes. Which best describes what is
    15·2 answers
  • Guys help me, to get 25 examples of computer software​
    8·1 answer
  • Focusing on a target market makes it harder to develop products and services that specific groups of customers want.
    10·1 answer
  • What was Bill Gates purpose for starting a business?
    12·1 answer
  • The science of networking is attributed to which government's involvement?
    11·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!