Software that prevents unauthorized users from accessing a private network is called a _____.
a. virus checker
b. gateway
c. firewall
d. sentry
Answer: c. firewall
Computer Science & Information Technology
You might also like to view...
In the URL http://www.mwu.edu/course/info.html#majors, the path and filename of the document are ____.
A. http:// B. www.mwu.edu C. /course/info.html D. #majors
Computer Science & Information Technology
Duration-driven scheduling means that adding additional resources redistributes the work and changes the duration.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When you ________ a file that is in Compatibility Mode, you change its version to Word 2013
Fill in the blank(s) with correct word
Computer Science & Information Technology
Use the Split Table Manager to manage a split database.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology