1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
4 years ago
15

Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th

rough the organizations network.which computer device or system should she use?
Computers and Technology
2 answers:
Vilka [71]4 years ago
8 0

Answer: The correct answer is a firewall.

Explanation: In order to protect the school’s network from hackers, worms and viruses, Jen needs to install a firewall. Firewalls are found in all business and school computer systems. In addition to protecting the network from the threats above, they can also filter websites. This allows access to only the websites that the administrator wants the students or employees to have access to.

ycow [4]4 years ago
6 0
NSA (network security appliance) also know as a firewall.

example:
https://www.sonicwall.com/en-us/products/firewalls/mid-range
You might be interested in
PLEASEEEE HELPP ILL MARK BRAINLIEST!! in a presentation outline, each slide must represent a main point in the outline. true or
patriot [66]

Answer: true

Explanation: hope this helps

6 0
3 years ago
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
Molodets [167]
The answer is a A. - Excel performs operations based on the order of Precedence
4 0
3 years ago
Complete the rest of this statement:
Radda [10]

Answer:

Computer science is about how computers work, in terms of programming, design and data processing.

Explanation:

Computer science is a discipline that studies issues related to information technology and its use, including the storage, processing, presentation, and transfer of information.

The fringes of computer science extend to many other sciences: for example, usability research is closely related to psychology and bioinformatics to biology, among others. Digital media research, on the other hand, has links to media science and communications research. Computer science also has a strong interaction with computational science and information society research examining the wider effects of data processing in different areas.

4 0
3 years ago
Write an algorithm and draw a flowchart to count the digits present in the given integer. ​
saul85 [17]

Answer:

The algorithm is as follows:

Input number  

count = 0

while(number not equal 0)

   number = number / 10

   count = count + 1

end

Print count

Explanation:

This gets input for the integer number

 Input number  

This initializes count of digits to 0

count = 0

The following loop is repeated while number is not 0

while(number not equal 0)

This performs integer division of the number by 10; the resulting division is saved in variable number

   number = number / 10

The count variable is incremented by 1

   count = count + 1

The loop ends here

end

This prints the count of integers

Print count

<em>See attachment for flowchart</em>

8 0
3 years ago
This is an example of what type of formula?
slamgirl [31]

Answer:

Average

Explanation:

The term 'average' refers to the 'middle' or 'central' point. When used in mathematics, the term refers to a number that is a typical representation of a group of numbers (or data set). Averages can be calculated in different ways - this page covers the mean, median and mode.

3 0
2 years ago
Other questions:
  • Which best describes a computer bug? A piece of computer hardware that is out of date or has a newer version a piece of computer
    14·2 answers
  • Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
    8·1 answer
  • Jesse earned $420 a week, and he worked 5 days a week. what is his daily wage?
    10·2 answers
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • HELP PLZZZZZZ
    10·1 answer
  • What is the initial page of the website​
    9·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
  • Today
    14·1 answer
  • Carl wants to add two new characters to the extraterrestrial battleship game he's
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!