1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
8

Which program or security application prevents access between a private and trusted network, and other untrusted networks?

Computers and Technology
2 answers:
zavuch27 [327]3 years ago
7 0

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

Dafna1 [17]3 years ago
7 0

Hi,

Answer: Firewall

<u>My work:</u> A firewall is a computer system that is meant to block and sometimes execute unauthorized outside forces or communication’s.

I Hope I Helped!

You might be interested in
Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.​
beks73 [17]

Answer:

numbers = []

for i in range(3):

 numbers.append(eval(input("Enter number: ")))

print('Sum is:', sum(numbers))

Explanation:

You want to use a loop to prevent repeating your code.

8 0
3 years ago
_________ involves connecting geographically remote computers into a single network and combining the computational power of all
galben [10]

Answer:

Grid computing involves connecting geographically remote computers into a single network to create a computational grid that combines the computing power of all the computers on the network to attack large computing problems.

7 0
3 years ago
Read 2 more answers
Which feature is a dynamic grouping of applications used in Security policy rules?
larisa86 [58]

The answer is application group.


4 0
3 years ago
Which of the following is the most reliable way to check the accuracy of a website?
ELEN [110]

Answer:

Examine the sources cited by the website

Explanation:

Due to the ability for everyone to create a website, and that there are no governing standards on the quality of information given on websites, it is important when conducting research to ensure that the sources on the web are up to date, accurate, and provide an objective view

Therefore, it is important to go through and examine the website critically using the the following criteria

1) The website coverage

2) The currency of the website's information

3) Weather the website is objective or not

4) The identity of the author of the website and the ability to contact the author

5) The accuracy of the information contained in the website

3 0
3 years ago
List and write at least t computer languages codes
miv72 [106K]
Cobol and python it's some other let me think
3 0
3 years ago
Read 2 more answers
Other questions:
  • Common icons found on the Windows desktop are _____.
    6·2 answers
  • Which of the following protocols is used to unsure secure transmissions on port 443?A. HTTPSB. TelnetC. SFTPD. SHTTP
    6·1 answer
  • Damian uses a modem to connect to a dial-up network. Which statements are true of a modem?
    11·2 answers
  • JOIN ZOOM <br> Code- 858 1417 3090 <br> Password- XvT18Q
    11·2 answers
  • The two main methods of verification
    6·1 answer
  • 9.2 code practice edhesive
    14·1 answer
  • 3.
    5·1 answer
  • What are different types of inner classes ?
    8·1 answer
  • Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated
    13·1 answer
  • on early ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (l
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!