1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
8

A ___ block unauthorized access to a network or an individual computer

Computers and Technology
1 answer:
valkas [14]3 years ago
3 0
Firewall is the answer.
You might be interested in
Most people entering the construction industry learn a specific craft through:
LuckyWell [14K]
Most people entering the construction industry learn a specific craft through: An apprenticeship program
7 0
3 years ago
Read 2 more answers
The class at the top of exception class hierarchy is ..........................
Lynna [10]

Answer:

<u>B) Throwable</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are a wide range of classes on the exception class hierarchy. All the way on the top is the Objects Class but since that is not an available answer we will move on to the next one. The next one is the <u>Throwable</u> class. therefore that is the answer.

**Exception is after Throwable , and Arithmetic Exception is at the bottom.... everything is a class so that is not a part of the hierarchy **

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
The set of rules for how computers talk to one another is called
lianna [129]
Protocol. Like TCP/IP or HTTP etc
6 0
3 years ago
What is the advantage of taking notes in a digital format? The technology protects digital notes from being copied. Digital note
VMariaS [17]

Answer:

Technology allows digital notes to be shared on the Internet.

Explanation:

6 0
3 years ago
Read 2 more answers
How do you give <br>brainlieset ​
Ray Of Light [21]

It has to be two people answering.Then vote braniest to who's answer you think is better.

8 0
3 years ago
Other questions:
  • Suppose you have an int variable called number. What Java expression produces the second-to-last digit of the number (the 10s pl
    13·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • A tablet computer transmits a file over a wi-fi link to an access point.
    13·1 answer
  • What do developers do to support software products
    14·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • How can you create an illusion of spatial depth in a two-dimensional design?
    15·1 answer
  • Use the drop-down tool to select the word or phrase that completes each sentence.
    7·1 answer
  • How is an interpreter different from a compiler?
    9·2 answers
  • What does mean in computer science
    10·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!