1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
4 years ago
15

You just realized the turn signal on your vehicle is broken,

Computers and Technology
1 answer:
zimovet [89]4 years ago
7 0

Answer:

c

Explanation:

You might be interested in
the central processing unit(CPU)is responsible for processing all information from program run by your computer.​
olasank [31]

Answer:

This is a true statement.

Further Explanation:

The CPU is technically the brain of a computer, containing all the circuitry required to process input, store data, and output results.

3 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.
Archy [21]

Answer:

The technician will want to add ACL for ports 20 and 21

Explanation:

The FTP protocol by default will attempt to use 21 for TCP access and 20 for data access.  By enabling an Access Control List (ACL) on ports 20 and 21, the technician can prevent FTP traffic from leaving the network on the default ports.

Cheers.

8 0
3 years ago
What does an interpreter or compiler turn code statements into? (Javascript)
otez555 [7]
B is the answer output DLL files 
6 0
3 years ago
Some of the items below indicate the steps required to move a slide to a different location in a presentation. Select those step
Ivan

Answer:

Following is the order of steps needed to move a slide to different location:

First: Select the slide

Second: Hold the slide button down

Third: Drag the slide to the desired place.

N/A : Enter the slide position desired.

N/A: Select Move from the Tools menu.

N/A: Switch to the Notes view.

I hope it will help you!

8 0
3 years ago
Other questions:
  • Virtually all webcams plug into a(n) ________ port.
    13·2 answers
  • The main benefit of encryption of a hard drive is to make part of an ROI report.
    15·1 answer
  • In which format is information stored on a hard drive?
    5·1 answer
  • Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create form
    7·1 answer
  • Define a member function PrintAll() for class PetData that prints output as follows. Hint: Make use of the base class' PrintAll(
    8·1 answer
  • True or false
    10·1 answer
  • Identify what a computer needs to
    14·1 answer
  • What would be the code of this in HTML ??
    13·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • HELPPPP MEEEE!!!!! ITS LIFE OR MUERTEEE
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!