answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
2 years ago
10

Firewalls are categorized into two; namely hardware firewall and software firewall. Identify the correct statement for a softwar

e firewall.
a. Software firewall is placed between the desktop and the software components of the operating system
b. Software firewall is placed between the router and the networking components of the operating system
c. Software firewall is placed between the anti-virus application and the IDS components of the operating system
d. Software firewall is placed between the normal application and the networking components of the operating system
Computers and Technology
1 answer:
garri49 [273]2 years ago
5 0

Answer:

Option (d) Software firewall is placed between the normal application and the networking components of the operating system

Explanation:

  • Software Firewalls protect the computer from trojans and malicious content which can arise from unsafe applications.
  • It also protect the computer from external network.
  • It filters the data to and from a software application in the desktop.
  • It also filters the data to and from a network.
  • It safeguards the computer from not loosing access to the attackers.
  • It is customizable software and has to be monitored like installing updates and storage spaces etc.
  • Software Firewall in conjunction with the Hardware Firewall must be used for the security of the desktop and the networks.
You might be interested in
Rupa would like to quickly insert a table into her document without having to worry about formatting the data in the table. Whic
USPshnik [31]
Internet tap and log on application
6 0
2 years ago
Read 2 more answers
A large industrial machine is able to monitor environmental conditions and quickly shut down and sound an alarm when it detects
Tamiku [17]

The feature of technology that allows this to happen is d. reduced latency.

Latency is the amount of time it takes for data to be transmitted in a network. Reduced latency therefore refers to a situation where data is transmitted with speed.

Reduced latency allows:

  • better communication
  • reduced lag and,
  • better gaming

The machine in question is only able to quickly sound the alarm because it has low latency.

In conclusion, we can say that low latency enables the machine above to sound the alarm quickly which means that low latency is important to the safety of that environment.

<em>Find out more at brainly.com/question/9337524.</em>

Options for this question include:

a. improved bandwidth

b. connection density

c. effective range

d. reduced latency

6 0
2 years ago
Read 2 more answers
On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
VladimirAG [237]

In this activity Morgan is preparing the digital files to a printer  on a DTP project.

Explanation:

DTP project is the creation of documents using page layout on a personal computer. The process of printing digital based images directly to variety of media substrates is known as digital processing.

The digital files like PDFs can be sent directly to digital printing press to print on paper, photo paper, fabric and so on.

They have unique fade rates and different sensitives to the various deterioration mechanisms. DTP is used for graphic designers to create documents.

6 0
2 years ago
Read 2 more answers
What is wrong with line 1?
Gelneren [198K]

Answer:

The set is a object of the class 'H' and the setY method is a member of G class which is not called by the object of H class.

Explanation:

  • If a user calls the G function which is not a private by the help of H class objects then it can be called. It is because all the public and protected methods of A class can be accessed by the B class if B extends the A-class.
  • If any class is extended by the other class then the derived class holds the property of the base class and the public and protected method can be accessed by the help of a derived class object.
  • The derived class object can be created by the help of base class like written in the "line 1".
  • But the base class can not call the member of the derived class.
5 0
2 years ago
Given a Scanner reference variable named input that has been associated with an input source consisting of a sequence of strings
Ghella [55]

Answer:

count = 0;

longest =0;

String myString = new String();

while (input.hasNext()){

myString = input.next();

if (myString.length() == longest) count++;

else

if (myString.length() > longest){

longest = myString.length();

count = 1;

}

}

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • The Spinning Jenny reduced the number of workers necessary to _______. a.remove cotton seeds from fibers b.pump water from the m
    7·1 answer
  • Which of the following best describes open-source web browsers?
    11·2 answers
  • A domain's ____ settings must be configured correctly so that the mail transfer agent (mta) can establish a connection with a re
    15·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • Desmond works in Power, Structural, and Technical Systems. He would most likely be employed by
    5·2 answers
  • When an author produce an index for his or her book, the first step in this process is to decide which words should go into the
    8·1 answer
  • Given is the array prices with 100 elements(prices[100]). The problem consists of two parts: 1. Find the highest price in the ar
    11·1 answer
  • Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
    8·1 answer
  • When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibilit
    7·1 answer
  • Write a function called add_tuples that takes three tuples, each with two values, and returns a single tuple with two values con
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!