The purpose of a firewall is to ________

A) stop computers that are connected to the Internet from being attractive to hackers
B) block spam from e-mail messages
C) enable Internet-connected computers to communicate and share information
D) enable computers with low-speed Internet to do the same things as those that have a high-bandwidth connection

A

Computer Science & Information Technology

You might also like to view...

The ________ operator takes an operand and reverses its truth or falsehood.

A) relational B) && C) || D) ! E) !=

Computer Science & Information Technology

Data hiding (which means that critical data stored inside the object is protected from code outside the object) is accomplished in Java by __________.

a. using the public access specifier on the class methods b. using the private access specifier on the class methods c. using the private access specifier on the class fields d. using the private access specifier on the class definition

Computer Science & Information Technology