1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
4 years ago
14

A firewall can consist of all devices positioned on the network _____________.

Computers and Technology
1 answer:
ale4655 [162]4 years ago
6 0

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

You might be interested in
Write a C++ program to exchange values of two variables using function exchange().
Shkiper50 [21]

Answer:

#include<iostream>

using namespace std;

//create the exchange function

void exchange(int a, int b){

   int temp;  //initialize temporary

   //swap the variables value

   temp=a;

   a=b;

   b=temp;

   //print the output after exchange

   cout<<"a is: "<<a<<endl;

   cout<<"b is: "<<b<<endl;

}

//main function program start from here

int main(){

  //initialization

  int a=3, b=6;

  exchange(a,b);  //calling the function

  return 0;

}

Explanation:

Create the function exchange with two integer parameter which takes the value from the calling function.

and then declare the third variable temp with is used for swapping the value between two variables.

first store the value of 'a' in the temp and then assign the 'b' value to 'a' and then, assign the temp value to b.

for example;

a=2, b=9

temp=2;

a=9;

b=2;

So, the values are swap.  

and then print the swap values.

Create the main function and define the input a and b with values.

Then, calling the exchange function with two arguments.

6 0
3 years ago
Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen.
Helga [31]

Answer: D Stretch

Explanation:

Stretching is the process of changing the screen resolution of a phone or computer monitor so as to give a better view of it.

6 0
3 years ago
Describe one type of technology that is useful in producing images from space.
marta [7]
One technology is the telescope
8 0
3 years ago
Which professional can film projects hire as part of their budgeted costs? You can hire special ____ lawyers and include their f
gregori [183]
This is clearly A it is not that hard
3 0
3 years ago
A forwarded message ____.
nadya68 [22]

Answer:

C. does include the email addresses of previous recipients and senders

Explanation:

When using email services, you can see functions such as send, forward, reply, reply all. For forwarded messages, when a user tries to forward a message to a recipient, it does not include the email address of previous recipient and senders because the aim of forwarding is to send to new recipients and hence it does not have anything to do with previous senders or recipients.

4 0
3 years ago
Other questions:
  • Which two things will you see when you collapse the view of the subdocument in a master document? (Microsoft Word)
    8·2 answers
  • A list of the slides in a presentation is found here.
    7·2 answers
  • One cost of starting your own business is _____.
    12·1 answer
  • Brainiest<br><br> What do you think should be done for the people whose jobs become automated?
    10·2 answers
  • Write qbasic code for given pattern<br><br>NEPAL<br>. EPA<br>. P​
    12·1 answer
  • A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
    14·1 answer
  • 1. Build and test D-type Flip-Flop using a built-in SR flip-flop.
    12·1 answer
  • Was LDAP version2 an internet standard in 1998? is it now?
    5·1 answer
  • TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
    10·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!