1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
9

A(n) __________ prevents outsiders from accessing corporate information the user does not want others to see.

Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
4 0

Answer:

Firewall

Explanation:

A Firewall prevents outsiders from accessing corporate information the user does not want others to see. It could be in the form of a hardware or a software.

Most companies use this in order to keep confidential informations from the public. This is very important to prevent unauthorized access which could lead to different types of problems in the long run.

You might be interested in
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
Conduct a site research on a specific property using the concepts discussed during this week.
Anni [7]

Answer:Penis!

Explanation:

Haha! Enjoy your day! Hahahahaha!

8 0
2 years ago
Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
Zepler [3.9K]
If multiple choice then d and a if not then the best one would be a!


hope this helps!!
5 0
3 years ago
What occurs when information is copied from an internet source to another computer?
Margarita [4]
The answer is pasting
3 0
3 years ago
what is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
laiz [17]

Answer:

Typosquatting

Explanation:

8 0
3 years ago
Other questions:
  • Operating systems that have windows and icons have which type of user interface?
    15·1 answer
  • Select the correct answer.
    9·1 answer
  • ________ is a computer-based network that triggers actions by sensing changes in the real or digital world.
    15·2 answers
  • Which of the following statements is true about a file stream?
    5·1 answer
  • Site at least 3 articles of impact of internet that affect in our daily lives.
    15·1 answer
  • The merge and center
    14·1 answer
  • You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
    5·1 answer
  • Xercise 1<br>1.<br>What is system? Explain the components of system in brief.​
    12·1 answer
  • What are some legal issues that can arise from the use of social media?
    10·1 answer
  • Screen reading for extended periods can cause___________ _____________, so the position the monitor to minimize glare and give y
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!