1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
2 years ago
7

Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from

certain malicious IP addresses. It can also block packets that are for ___________________that are not used. When packets are blocked from entering a computer or network they are said to be ___________________. A firewall can look at the data inside each packet of data. This is known as ___________________. Computers that are protected by the firewall are part of the ___________________.
Computers and Technology
1 answer:
Leokris [45]2 years ago
6 0

Answer:

eeeeeee eeeeee yyyyyyyyrrrr

Explanation:

You might be interested in
A occurs when you reset a mobile device but retain your installed applications and personal settings
yaroslaw [1]

Answer:

Soft Reset

Explanation:

A Soft Reset is a type of reset in which a gadget such as smartphones, PC, or other related gadgets undergo to refresh or reset the device or makes certain applications work or function well without user data, settings and applications.

Hence, a SOFT RESET occurs when you reset a mobile device but retain your installed applications and personal settings

3 0
2 years ago
Read 2 more answers
What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
Leno4ka [110]
Greeting's!

It Will Ask You To Input An Old Password "Current" Password And A "New" Password After That Is Done You Can Use The "New" Password Instead Of The "Old" Password.
3 0
2 years ago
You can join tables by using a condition in the ____ clause.​
andre [41]
You can join tables by using a condition in the "where" clause.
4 0
3 years ago
You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
Bezzdna [24]
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
5 0
2 years ago
Gathering information with your eyes is called
Ivahew [28]
Observing, Looking, Collecting, there are a few words for "gathering information with your eyes". 
4 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ database supports data distributed across several different sites.
    7·1 answer
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • Select the correct navigational path to mark all teachers who have achieved “excellent” on their evaluations a red background.
    11·2 answers
  • Brake fluid should be checked __________.
    8·2 answers
  • Whay is processing?Explain with an example.​
    9·2 answers
  • Please be my friend. my best and only friend isn't talking to me for some reason
    9·2 answers
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
  • Jeroo Bob has just awoken from a long night's sleep and is hungry for some winsum flowers. He walks out of
    7·1 answer
  • List at least 5 disadvantages caused by computer viruses?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!