1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
8

Which program or security application prevents access between a private and trusted network, and other untrusted networks?

Computers and Technology
2 answers:
zavuch27 [327]3 years ago
7 0

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

Dafna1 [17]3 years ago
7 0

Hi,

Answer: Firewall

<u>My work:</u> A firewall is a computer system that is meant to block and sometimes execute unauthorized outside forces or communication’s.

I Hope I Helped!

You might be interested in
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
What kind of word is the pronoun in bold letters?
tresset_1 [31]

Answer:

Subject

Explanation:

The kind of word that is pronoun in bold letters is "Subject".

In Example

We get our paychecks on Friday, and I always need mine.

There We and I are subjects.

5 0
3 years ago
Read 2 more answers
David bought 5.2 pounds of oranges for $1.20 per pound . how much did david spend ..............................................
Tcecarenko [31]

Answer:

David spent $6.24.

Explanation:

5.2 times 1.2

3 0
3 years ago
How do i download my music from my computer to google play?
tresset_1 [31]
You can't do it to Google play. but you can connect to your computer and extract it and play it as a file
8 0
3 years ago
Other questions:
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • A properYour customer has connected a 1000-watt microwave oven and a 600-watt mixer to a 15-amp branch service line for the kitc
    11·2 answers
  • PLEASE DON'T DELETE THIS QUESTION!!!!
    15·2 answers
  • If an object moves without rotation or angular displacement, it is called translation.
    11·1 answer
  • Which of the following technologies can operate in the 125 kHz to 134 kHz range?
    10·1 answer
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • Hannah decides to burn her video portfolio to a DVD. She wants to hand it over to a movie producer she will meet at a social eve
    15·1 answer
  • Calculate the maximal size of a file if we have:
    6·1 answer
  • Which is an example of an operating system? (5 points)
    5·1 answer
  • 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!