1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
13

A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith

er blocks it or allows it to pass through is called: a-Antivirus b-Firewall c-Antispyware d-Malware 2-A device designed to forward data packets between networks is called: Router 3-A computer network service that allows clients to make indirect network connections to other network services is called 4- Which of the following answers list the protocol and port number used by a spam filter
Computers and Technology
1 answer:
photoshop1234 [79]3 years ago
3 0

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

You might be interested in
1) Type a statement that gets an input value into variable numBers. Assume scnr already exists and numBers has been declared.
Sergio039 [100]

Answer:

Following are the code in the java language  

numBers = scnr.nextInt ( ) ;

Here scnr is an instance of scanner class .

Explanation:

In this code, we take the input by using the object of Scanner class i.e "scnr". The scanner class in the java programming language is used for taking the input by the user. The scnr.nextInt ( )  is taking the input which is stored in the  "numbers" variable.

So the whole program is looking like that  

import java.util.*; // import package  

public class Main

{

public static void main(String[] args) // main function

{

 int numBers; // variable declaration

 Scanner scnr=new Scanner(System.in); // create the instance of scanner class

 numBers=scnr.nextInt( ) ; // taking input

 System.out.println(numBers); // display the value of numBers

}

}

Output:

78

78

4 0
3 years ago
(5 points) Create a user-defined data structure (i.e., struct) called Point that represents a two-dimensional Cartesian coordina
Harlamova29_29 [7]

Answer:

Here is the C++ program:

#include<iostream>  //to use input output functions

#include <math.h>  //to use sqrt and pow function

#include<iomanip>  //to use setprecision

using namespace std;   //to identify objects cin cout

struct Point  {  // structure name

float x,y;  // member variables

};  

float calculateDistance (Point a, Point b)  {  //function that that takes two parameters of type Point

float distance;  //stores the distance between two points

distance=sqrt(pow(a.x-b.x,2)+pow(a.y-b.y,2));  //formula to compute distance between two points

return distance;  }  //returns the computed distance

int main()  {  //start of main function

Point p1,p2;  //creates objects of Point

cout<<"Enter point 1 coordinates: "<<endl;  //prompts user to enter the value for coordinates of first point

cin>>p1.x;  //reads input value of x coordinate of point 1 (p1)

cin>>p1.y;  //reads y coordinate of point 1 (p1)

cout<<"Enter point 2 coordinates: "<<endl;  //prompts user to enter the value for coordinates of second point

cin>>p2.x;  //reads input value of x coordinate of point 2 (p2)

cin>>p2.y;  //reads y coordinate of point 2 (p2)

cout<<"The distance between two points is "<<fixed<<setprecision(2)<<calculateDistance(p1,p2);} //calls function by passing p1 and p2 to compute the distance between p1 and p2 and display the result (distance) up to 2 decimal places

Explanation:

The program has a structure named Point that represents a two-dimensional Cartesian coordinate (x, y). The member variables of this struct are x and y, which are both floating-point values. A function called calculateDistance takes two parameters, a and b of type Pointer and returns the distance between the two given points using formula:

\sqrt{(x_{2}-x_{1} )^{2} +(y_{2}-y_{1} )^{2}  }

It uses pow function to compute the power of 2 and sqrt function to compute the square root.

Then in main() method the program prompts the user to enter coordinates for two points and calls calculateDistance method to compute the distance between two points and display the result up to 2 decimal places using setprecision(2).

The program along with the output is attached in a screenshot.

6 0
3 years ago
Which of the following are ways that
Viefleur [7K]

Answer:

A and b

Explanation:

3 0
3 years ago
The product of two integers is -180 if one of them is 12 find the other​
astraxan [27]

The answer is -15. This because 12 * 15 = 180 so in order to make it negative one of the integers has to be negative and since 12 is given you have to make 15 negative.

6 0
3 years ago
If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices?
Gnesinka [82]

Answer:

c. 2

Explanation:

As the routers are only involved with the process of finding the best route to reach an IP address (the destination hosts), they don't look at the IP Datagram payload (which includes the transport protocol header), only to IP header.

So, the only transport processes that "talk"each other, are the one on the source host (defining TCP or UDP source port/s, and the other  on the destination host (defining TCP or UDP destination port/s), so two applications (or more) in both machines can exchange data.

5 0
3 years ago
Other questions:
  • A(n) _______ is a collection of related data organized in a way that facilitates data searches.
    6·1 answer
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • An empty frame used to reserve space for a picture to be inserted at a later time is know as what
    6·1 answer
  • Factors of production are A. inputs into the production process. B. social and political conditions that affect production. C. t
    7·1 answer
  • The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
    14·1 answer
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • To distribute one or more presentations for use on another computer, which of the following features should you use?
    13·1 answer
  • In this problem, you will fill in the code for a function count_digits(val) that takes a positive integer, val, and returns a li
    12·1 answer
  • Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (
    10·2 answers
  • What is the creative nature of a computer<br> Help
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!