1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Colt1911 [192]
3 years ago
10

Who is using this website for edmentum tests?

Computers and Technology
2 answers:
strojnjashka [21]3 years ago
4 0

Answer:

i am using edmentum

Explanation:

babymother [125]3 years ago
3 0

im using it for eddgenuity

You might be interested in
Artificial intelligence seeks ways to improve a computer's capabilities in ____ and reasoning tasks. intellectual computational
Tatiana [17]
The answer is Computational
4 0
3 years ago
Which of the following can you do under the fair use exceptions?
cricket20 [7]
I would say...

C: Use graphics and content for educational purposes in small amounts if you give the creator credit. 
6 0
3 years ago
Please write down your student id. take the last digit of your student id as m.
solmaris [256]
Now why in the world anyone would want to do that....



Really!!!!
7 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform
ryzh [129]
Is known as the binary system
8 0
3 years ago
Read 2 more answers
Other questions:
  • A software program that enables users to find and display information stored as html pages on the internet is a(n) ____.
    5·1 answer
  • Your network administrator finds a virus in the network software. Fortunately,
    13·1 answer
  • ?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
    7·1 answer
  • Write a Console Java program that asks the user to enter one sentence on the keyboard. Output on the console:
    6·1 answer
  • When did gaming become a thing?
    7·2 answers
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • A thin red border indicates the active cell. (True or False)
    12·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • define a computer, state its 3 main activities with examples of the functions of each of those activities​
    7·1 answer
  • Assume that students in a course are required to produce a written report on an ICT-related
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!