1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
2 years ago
7

Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from

certain malicious IP addresses. It can also block packets that are for ___________________that are not used. When packets are blocked from entering a computer or network they are said to be ___________________. A firewall can look at the data inside each packet of data. This is known as ___________________. Computers that are protected by the firewall are part of the ___________________.
Computers and Technology
1 answer:
Leokris [45]2 years ago
6 0

Answer:

eeeeeee eeeeee yyyyyyyyrrrr

Explanation:

You might be interested in
Create and Provide complete program that includes a comments header with your name, course, section and other program details an
agasfer [191]

Answer:

Written using C++

/*Enter Your Details Here*/

#include<iostream>

#include<cmath>

using namespace std;

int main()

{

//1

float side;

cout<<"Enter the side of a square: ";

//2

cin>>side;

//3

float perimeter = 4 * side;

cout<<"The perimeter is "<<perimeter<<endl;

//4

float area = side *side;

cout<<"The area is "<<area<<endl;

//5

float diagonal = sqrt(2 * side * side);

cout<<"The length of the diagonal is "<<diagonal;

return 0;

}

Explanation:

<em>I've added the full source code as an attachment where I used more comments to </em><em>explain </em><em>difficult line</em>

Download cpp
7 0
3 years ago
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
What is the correct sequence in which a computer operates​
GrogVix [38]

Answer:

Booting is a startup sequence that starts the operating system of a computer when it is turned on. A boot sequence is the initial set of operations that the computer performs when it is switched on. Every computer has a boot sequence.

8 0
3 years ago
HEYY GUYS START REPORTING ALL THE SPAMMERS PLSS!!!!! For the spammers, I hope you go to hell &gt;:c!!!!!!!!!!!
Molodets [167]

Answer:

i totally agree

Explanation:

4 0
3 years ago
Instructions
Reptile [31]

The assignment is about Telephone, internal combustion engine, and electrical light.

<h3>What is file?</h3>

A file is a  computer system container for storing data. Files used in computers are similar in characteristics to  paper documents used in libraries and office files. There are different types of files like text files, data files, folders, binary and graphic files and these different types of files store different types of data. A computer's operating system can store files  on optical discs, hard drives,  or other types of storage devices.

In most operating systems, a file must have a unique name within a specific directory. However, when creating a file name, some characters are considered illegal and therefore cannot be used. A file name consists of a name with an extension, also known as a file extension. The file extension is the two to four characters after the period of the full file name.

To learn more about file, refer;

brainly.com/question/29055526

#SPJ4

8 0
1 year ago
Other questions:
  • GUI allows users to communicate with a device and see what they are doing onscreen.
    9·1 answer
  • hona is buying a rug for her room. Store A has the rug for $45 with a 10% discount. Store B has the same rug for $46 and is offe
    5·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ______
    15·1 answer
  • Consider the following code: // Merge mailing list m2 into m1 void merge (MailingList m1, MailingList m2) { for (int i = 0; i &l
    12·1 answer
  • How are Earth's plates made?
    14·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
  • MODERATOR DELETE MY ACC
    8·2 answers
  • Which device allows users to directly hear data from a computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!