The security devices situated between the routers of a private network and a public network to protect the private network from unauthorized users are called:

Answers

Answer 1
The security devices situated between the routers of a private network and a public network to protect the private network from unauthorized users are called: Firewalls

Related Questions

A group of eight bits is called a _______. a. numeric data b. byte c. megabit d. binary

Answers

The answer is B: byte

What is the main scientific weakness in watson and crick's paper?

Answers

When writing a scientific paper, it's ethical to refer to those who helped you in your paper and to cite all the references you used in order to give credits to the owners of these references.

In Watson and Crick's paper, they did not refer to those who assisted them in their research neither gave them credit. This is somehow considered as stealing someone's work and referring it to yourself.
This was the major scientific error in their paper.
One weakness of their paper is that much of the work was drawn by Crick's wife and she was not credited. They also do not answer the concern of what makes complementary nucleotides rotate in space, thereby producing a DNA spiral.

You can block logical ports from invaders and make your computer invisible to others on the internet by installing ________. a firewall a packet sniffer antivirus software a packet filter

Answers

A firewall is the best choice. This will help protect your computer from being seen on a network and being invaded by snoopers who are wanting to do damage to your system or files. Having a firewall is the first line of defense against hacking and sabotage.

a personal naratiation is like a autobiography in that it

A tells your whole life story, from birth to present
B is a story about something in the author life written by the author
C is written in third person
D is a story about a person written by another person

Answers

B is correct...

Please vote my answer brainliest. thanks!

You can use a css style sheet rule to override the default font color, which is black. which term is used to describe this style sheet behavior?

Answers

color: # your color i.e ffffff

Which type of software is created and updated by a worldwide community of programmers and is available for​ free?

Answers

Open source is created and updated by a worldwide community of programmers and is available for​ free. Many students are in luck, as they can easily study publicly accessible codes and have a possibility to make better software. It also has lots of advantages, such as getting high-quality results when the source code is passed around, tested and fixed.The most important thing - it is a valuable learning opportunity for programmers and opportunity to improve their skills.

He smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sync your cell phone and your computer.​

Answers

The smallest network is a personal area network, which is a network of personal devices, such as the network you use when you sync your cell phone and your computer. personal area network

Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?

Answers

Is a Cookie is a small file that a web server writes to the disk drive of the client computer, containing information about the user?

What feature sets Macs apart from other operating systems?

desktop
Finder
mouse
GUI

Answers

Desktop, a mac doesn't have a separate power system
Trick question!

Desktop and mouse are NOT a part of the operating system. They are operating system although mac is the only one to use a one button mouse

The GUI and finder feature are only used with apple but the apple operating system is built on top of the unix operating system. Similar to Linux and other systems that do have similar features but just with different names.

If the question was what sets apple systems apart from others it would be the mouse with the one button.

Given : an int variable k, an int array currentmembers that has been declared and initialized , an int variable nmembers that contains the number of elements in the array , an int variable memberid that has been initialized , and a bool variable isamember, write code that assigns true to isamember if the value of memberid can be found in currentmembers, and that assigns false to isamember otherwise. use only k, currentmembers, nmembers, and isamember.

Answers

Final answer:

To check if the value of memberid exists in the currentmembers array, you can use a loop to compare each element with memberid and assign true to isamember if a match is found.

Explanation:

One way to check if the value of memberid can be found in currentmembers array is by using a loop. You can iterate through each element in the array and compare it with the value of memberid. If a match is found, you can assign true to isamember and break out of the loop. Otherwise, after the loop ends, you can assign false to isamember.

bool isamember = false;
for (int i = 0; i < nmembers; i++) {
   if (currentmembers[i] == memberid) {
       isamember = true;
       break;
   }
}

In this code, we are using a for loop to iterate from the first index (0) to the last index (nmembers - 1) of the currentmembers array. We check if the value at each index is equal to memberid, and if so, we assign true to isamember and break out of the loop.

Powerpoint increased the weight of a line in ____ increments.

Answers

One-fourth increments

To apply a style to one or more elements on a web page, configure a css ________.

Answers

external style sheet

element {
background-color: #ffffff

}

What is element 115 and what is it from?
Also what did it do?

Answers

Its temporary name, which is being used as a placeholder, is ununpentium. Element 115 is one of a number of super heavy elements—elements with an atomic number greater than 104—that are so short-lived, they can't be detected in nature. ... Creation of element 115 during a particle collision of americium and calcium atoms.

Can't expand stack segment by 8 bytes to 524288 bytes.

Answers

try to clear your cashe its possible on a good computer but on a old its not possible for that hardware

Final answer:

The message “Can’t expand stack segment by 8 bytes to 524288 bytes” suggests a stack overflow issue in a program that has reached the maximum size limit for the stack memory allocated by the operating system.

Explanation:

In the context of programming and software development, encountering an error message such as “Can’t expand stack segment by 8 bytes to 524288 bytes” usually indicates that the program is attempting to use more stack memory than is allowed. The stack is a region of memory used for the temporary storage of variables, return addresses, and for managing function calls. This type of error is often termed a stack overflow, which occurs when there is an attempt to push more onto the stack than it can handle. This could be due to excessive or infinite recursion, allocating too much space for variables on the stack, or a lack of proper memory management in the code. To resolve this issue, a programmer would need to review the code for functions that may be using excessive stack space, and modify the code to use the stack more efficiently or allocate memory on the heap instead.

What command should you use to determine the fqdn of a computer with ip address 172.31.209.5?

Answers

I use host -a

dig and nslookup could do it, I forget the switches and arguments.

The motherboard is considered the "brain” of a computer because it controls
a computer’s speed.
performs specific tasks.
connects a system’s components.
processes stored information.

Answers

Its connect a system’s components .

Answer:Its connect a system’s components .

Explanation:

took test on edge 2020

The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,000 photos taken with the phone's camera! Is the salesperson telling me the truth? Why or why not?

Answers

The sale person is not telling you the truth. 
This is because, the size of an average picture on phone is about 3 megabytes. One gigabyte is equivalent to 1000 megabytes; so 8GB is equivalent to 8,000MB [Megabytes].
 If you divide 8,000MB by 3MB, which is the size of an average picture, you will have approximately 2,666 pictures. This means, you will only be able to store about 2,666 pictures on that phone compared to the 10,000 pictures the sale person is talking about.

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a?

Answers

Answer:

Theme

Explanation:

To change the overall design of an entire document to include colors, fonts, and effects, you should apply a theme. Theme comprise of color, fonts and effects.

Cheers.

your grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer.

Answers

The purchasing power is less than it used to bee. Back then, $1 was worth $50 dollars today. Money was very scarce. 

The ASE certification system uses _______ testing and an evaluation of on-the-job experience to confirm that a technician meets professional standards of excellence

A. mandatory
B. voluntary
C. specialized
D. professional

Answers

The ASE certification is a voluntary credential that signifies a technician's competency and adherence to professional standards, achieved through testing and practical experience. option B) which is voluntary is the correct answer.

The ASE certification system uses voluntary testing and an evaluation of on-the-job experience to confirm that a technician meets professional standards of excellence. A certification is awarded by a professional organization or other nongovernmental body and is not legally required in order to work in an occupation.

It requires demonstrating competency to do a specific job, often through an examination process. This system helps ensure that individuals have the necessary skills and knowledge to perform in their respective fields. option B) is the correct answer.

Assigning ____ to a field means that no other classes can access the field’s values.

Answers

classes in theb assigned

Anti-bullying laws in most states are designed to provide

A. guidelines for appropriate online behavior.
B. reasons for why people bully others online.
C. schools with ways to punish online bullying.
D. advice for preventing online bullying.

Answers

i would put it as c but that what i think 

Okay. Anti-bullying laws aren't exactly designed to specifically say why people bully others online nor to give advice for preventing online bullying.. Therefore, B and D are out. It doesn't fully give guidelines for appropriate online behavior, but more of reasons with helping schools find ways to punishing those who bully online. The answer is C.

What command is used to request the name and address information from a dns server?

Answers

nslookup is deprecated in favor of dig

Your computer is configured to obtain an ipv4 address and dns server address automatically. you are concerned that the ipv4 routing table is incorrect. what utility will display the ipv4 routing table

Answers

netstat -r

route

ip route

Which of the following statements is the least abstraction of the World Wide Web?

A. a bunch of Web pages

B.documents, images, and other data you can access by providing a URL (Web address)

C.the Internet

D.Wikipedia, Facebook, and other cool sites

Answers

B.documents, images, and other data you can access by providing a URL (Web address)

A(n) ________ device facilitates file sharing and data backup.

Answers

A NAS device facilitates file sharing and data backup.

NAS stands for "Network Attached Storage". It a device design specially to store and manage files and within a network. It provides centralized data access and storage.
NAS is somehow considered as a specialized external hard drive.
network sharing device This usually acts like a router and when the process is initiated activities like printing, surfing the internet or even files that were in a device that can shared, stored, retrieved on the other device that the network is being shared with. An example of this can be a wireless printer, a mobile phone that the internet is shared with the computer or even a normal router which acts as a switch for sharing network activity.

The internet connects millions of computers connected through millions of ____ worldwide.

Answers

Servers is the correct answer

The internet connects millions of computers using millions of network links worldwide, which can be either physical or wireless. Devices communicate through agreed protocols, facilitating efficient information sharing. This vast network includes a diverse range of devices and is integral to global communication.

The Internet :.

These network links can be either physical cables, such as undersea cables connecting continents, or wireless connections like Wi-Fi and satellite links.

Devices such as servers, personal computers, and even cars and domestic appliances are part of this vast network, communicating with each other using protocols such as TCP/IP to efficiently share information.

Therefore,

The internet connects millions of computers through millions of network links worldwide.

Your crt monitor flickers. what should you do

Answers

To stop your CRT screen from flickering, you need to change the rate (Hertz) at which your monitor refreshes. To do this in Windows 7, begin by clicking on Start>Control Panel>Display. This will bring up your computer's displaysettings.

A _____ is a search engine that combines internet technology with traditional library methods of cataloguing and assessing data.

Answers

The correct answer would be a Virtual Library.

Is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers. enterprise network wide area network campus area network local area network value-added network?

Answers

The answer is a Local Area Network
Other Questions
Destruction of tundra vegetation will likely result in _____. a. freezing of the soilb. lessening of soil moisturec. deepening of the active zoned. melting of the permafrost pls help Match the fiber with the origin(s) and destination(s) of the impulses it carries: visceral afferent fibers carry information from __________. Solve:r/5 - 6 = -1A)r = 1B)r = 5C)r = 10D)r = 25 How does Anglo-Saxon sense of home compare to ours? Suppose that a dominant allele (P) codes for a polka-dot tail and a recessive allele (p) codes for a solid colored tail. If two heterozygous individuals with polka-dot tails mate, what's the probability of the phenotype and genotype combinations of the offspring? A. 25 percent chance of a polka-dot tail and 75 percent chance of a solid colored tail (25 percent PP; 50 percent Pp; 25 percent pp) B. 50 percent chance of a polka-dot tail and 50 percent chance of a solid colored tail (50 percent PP; 50 percent pp) C. 75 percent chance of a polka-dot tail and 25 percent chance of a solid colored tail (25 percent PP; 50 percent Pp; 25 percent pp) D. 75 percent chance of a polka-dot tail and 25 percent chance of a solid colored tail (75 percent Pp; 25 percent pp) Crystal is having a painting party with her friends. Each friend will need two canvases. The equation to find the total number of canvases Crystal needs is c=2f , where c is the number of canvases and f is the number of friends. Which variable is the independent variable? A. c B. f C. There is no relationship between the variables. How might athenian democracy be considered the root of modern democratic governments 9. Simplify the expression. 8 5(12x + 8) A) 36x + 24 B) 60x 32 C) 60x + 16 D) 60x + 48 6% of 124 =7.440.74474.4744If you could explain would be great five times the sum of a number and 27 is greater than or equal to six times the sum of the number and 26 what is the solution to set of the problem What precautions must be taken when you introduce a mixture of compounds to be separated onto a liquid chromatography column? If 2.32 g of ethanol reacts with 10.6 g of oxygen, how many moles of water are produced? What is the function of the noun clause in this sentence?The street musicians sang to whomever passed them.a) subjectb) appositivec) object of a prepositiond)direct object what is the difference between 506 and 233 According to the thomson model of the atom what is the simplest negative particle in an atom What is the most likely depositional environment for an evaporite unit? Optimize network of suppliers, plants, and distribution centers is an outcome of the _______________ scm function. The average full spreading rate over the last 20,000,000 years at placemark a in the red sea is _________. approximately 1 centimeter per year approximately 10 centimeters per year approximately 19 centimeters per year approximately 2 centimeters per year Why does Acrisius place his daughter and her son in a sealed chest and then put them out to sea? 1.The Fifteenth Amendment guaranteed _______________ for all US citizens, regardless of "Previous condition of servitude."A) freedomB) citizenshipC) voting rightsD) religious tolerance2.Which group was still not allowed to vote following passage of this amendment?A) womenB) poor menC) rich menD)former slaves3.The Fifteenth Amendment was the last of the ___________________ amendments.A) CarpetbaggerB) LincolnC) ReconstructionD) Scalawag Steam Workshop Downloader