1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
11

Why is yo utu be down? (You restrict talking about yo utu be, really)

Computers and Technology
2 answers:
seropon [69]3 years ago
6 0

Answer:

its working now

Explanation:

ladessa [460]3 years ago
4 0
Lololololololl it’s crazy on here
You might be interested in
Program ____ let programmers write code using a word processing-like interface.​
kati45 [8]
<span>Program "editor" </span>let programmers write code using a word processing-like interface.​

This is utilized by programming software engineers; gives them a chance to compose code utilizing a word processing like interface that usually includes functions, like, AutoCorrect and AutoComplete.it is also called text editor.
3 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Why did sugar planters come to Louisiana?​
Fiesta28 [93]

Answer:

Because the soil there was rich and untouched.

Explanation:

5 0
2 years ago
Read 2 more answers
The ____number system is base 10​
evablogger [386]

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

This is a fill-in-blank question.

The answer is:

The decimal number system is base 10.

In our everyday life, we use a number system that is a Base-10 system. As we know that the base-10 is known as the decimal system and this number has 10 digital starting from 0 to 9 such as:

0,1,2,3,4,5,6,7,8,9

We use this number system in our daily accounting and in daily life and it is a base-10 number system. This number system uses 10 as its base number so it is called a base-10 system. It is also called the decimal number system.

7 0
3 years ago
Based on the relational model, create the database metadata as part the physical designphase.b)from the metadata, write the sql
galben [10]
<span>Which is not a component of a database that describes how data is stored?</span>
5 0
3 years ago
Other questions:
  • Which protocol is often used to publish web pages to a web server?
    5·1 answer
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • Please help me with this! I’m using Python 3
    12·1 answer
  • Two electronics technicians are measuring electrical quantities in circuits. Technician A says that copper, glass, porcelain, an
    11·1 answer
  • Differences between windows xp and windows vista
    14·1 answer
  • Does giving a set instructions to someone, or a recipe for a cake represent an algorithm?
    13·1 answer
  • What is data analysing data and give three examples ?​
    9·1 answer
  • Describe the impact of improvement ls in technology and transportation on american citizens. ​
    7·1 answer
  • Why do we install doorbells in our house
    11·2 answers
  • HELP THIS IS SO DIFFICULT
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!