1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
3 years ago
14

WILL GIVE BRAINLIEST!!!!!! 10 POINTS!!!!

Computers and Technology
2 answers:
Ksivusya [100]3 years ago
8 0

Answer:

I think it is B. Javascript. I might be wrong

stepladder [879]3 years ago
4 0

Answer:

javascript?

Explanation: idrk

You might be interested in
Secondary sources<br> information gathered from primary sources.
sergeinik [125]

Answer:

what

Explanation:

8 0
4 years ago
Read 2 more answers
Which of the following is the language used to create content that is shown on the World Wide Web?
kondor19780726 [428]
Your answer is HTML. 
6 0
3 years ago
Read 2 more answers
Which is not a proper statement?
kodGreya [7K]

Answer:

leftisBlocked()

Explanation:

4 0
3 years ago
Read 2 more answers
Which detail should be included in a summary about the passage check all that apply in warm rivers play role in arctic sea ice m
SSSSS [86.1K]

Answer:

A. Warm water is melting the Arctic Sea ice.

C. The sudden flow of warm waters into the sea are rapidly warming the ocean's surface.

Explanation:

ed2020

5 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • ________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
    7·1 answer
  • How to cite a website, like asha.org?
    6·1 answer
  • One way to save time and get to the colleges that you are most interested in at a college fair is to
    7·2 answers
  • Motorcycles have two or three wheels, a seat for the rider and at least a ____ horse-powered engine.
    15·1 answer
  • Lil fun question : burgers or pizza??
    6·2 answers
  • Which of the following are causes of a run-time error. Choose all that apply.
    13·1 answer
  • Logan has developed an excellent presentation with interesting content. He received great feedback on the evaluation
    10·1 answer
  • Filtering is a function of _____.
    5·1 answer
  • why is it useful to learn how to solve and program solutions with a limited set of command in computer science
    5·1 answer
  • Ali rolled a ball down a hill. This graph shows the kinetic and potential energy of the moving ball.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!