1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
8

Which program or security application prevents access between a private and trusted network, and other untrusted networks?

Computers and Technology
2 answers:
zavuch27 [327]3 years ago
7 0

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

Dafna1 [17]3 years ago
7 0

Hi,

Answer: Firewall

<u>My work:</u> A firewall is a computer system that is meant to block and sometimes execute unauthorized outside forces or communication’s.

I Hope I Helped!

You might be interested in
1.
saul85 [17]

Answer:

1. Speakers

2. Software

3. C.P.U

4. ROM

5. Hard drive

6. RAM

7 0
2 years ago
To move an icon, you right-click it and select “Pin to start menu.” True False
tester [92]

"To move an icon, you right-click it and select “Pin to start menu.” True False"

False

4 0
2 years ago
Read 2 more answers
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Which of these statements regarding mobile games is true?
SashulF [63]

Answer:

A. They are typically played in doors.

Explanation:

Most logical answer

8 0
3 years ago
Read 2 more answers
Which of the following data types can hold a fractional (decimal) number?
zvonat [6]
A float data type can hold a decimal number.
6 0
2 years ago
Other questions:
  • Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
    13·1 answer
  • A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music. true or false
    14·1 answer
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • What are the pros and cons of the internet’s ability to access information
    8·2 answers
  • Jake was working on an essay for his English class on a stormy Sunday afternoon. Before he could save his document, a big strike
    8·1 answer
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • Write a test program that creates two Rectangle objects—one with width 4 and height 40 and the other with width 3.5 and height 3
    5·1 answer
  • How would you describe<br> "analogous color harmony" to a six year old?
    13·1 answer
  • explain why you can determine machine epsilon on a computer using IEEE double precision and the IEEE Rounding to Nearest Rule by
    7·1 answer
  • Which of the following shows the correct order of inventions that helped the first computers make calculations?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!