Software that prevents unauthorized users from accessing a private network is called a _____.

a. virus checker
b. gateway
c. firewall
d. sentry


Answer: c. firewall

Computer Science & Information Technology

You might also like to view...

In the URL http://www.mwu.edu/course/info.html#majors, the path and filename of the document are ____.

A. http:// B. www.mwu.edu C. /course/info.html D. #majors

Computer Science & Information Technology

Duration-driven scheduling means that adding additional resources redistributes the work and changes the duration.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you ________ a file that is in Compatibility Mode, you change its version to Word 2013

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use the Split Table Manager to manage a split database.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology