1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bonufazy [111]
3 years ago
15

The mechanism for preventing traffic that is perceived to be dangerous to the network is known as a a0.

Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0
I would go with firewall
You might be interested in
* Describe the five components of a<br> computer
LenaWriter [7]

Answer:

Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.

5 0
2 years ago
Read 2 more answers
GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
kumpel [21]
The answer is display information
4 0
3 years ago
Read 2 more answers
As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho
Alika [10]

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

8 0
4 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
Describe the necessary Java commands to create a Java program for creating a lottery program using arrays and methods.
netineya [11]
I think each lottery ticket will cost £5 each so you would count in 5s till you reach the amount of tickets to get the answer which is £25
5 0
3 years ago
Read 2 more answers
Other questions:
  • Match the job skills with the correct job role.
    12·1 answer
  • What would make this comparison statement False? Complete with the appropriate relational operator. "G" _____= "G"
    10·1 answer
  • What do we call the distribution and access of illegal copies of digital books??
    10·1 answer
  • When you hear or see the warning signal of any emergency vehicle, you should ________________.?
    14·1 answer
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • NEED HELP WILL MARK BRAINLIEST AND 100 POINTS FOR ANSWER Which LIKE operator would match a single character?
    9·2 answers
  • ¿Que similitudes y que diferencias tenían el estado y la iglesia en el proceso de colonizacion de america?​
    6·1 answer
  • . 。 • ゚ 。 .
    10·2 answers
  • To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.
    11·1 answer
  • Anil needs to show the overlap of people who live in a certain neighborhood in his city and who support a specific political can
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!