A ________ acts as a security buffer between a corporation's private network and all external networks.

A. firewall
B. disaster recovery plan
C. virus checker
D. password


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following lines would be the prototype for an overloaded cast operator function that converts an object of user-defined type Time into a double?

a. Time::operator double() const; b. Time::static_cast double() const; c. Time::operator_cast(double) const; d. Time::double() const;

Computer Science & Information Technology

An independent Sub procedure can contain one or more parameters in its procedure header.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Characteristics that define a field or other controls are called field lists

Indicate whether the statement is true or false

Computer Science & Information Technology

You can set different slide timings for each ____.

A. animation B. slide C. master D. table

Computer Science & Information Technology