1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
4 years ago
6

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly deliv

ered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?
a. file serverb. DNS serverc. DHCP serverd. proxy server
Computers and Technology
1 answer:
omeli [17]4 years ago
8 0

Answer:

Proxy Server

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request. This speeds up the delivery of resources to the users.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
You might be interested in
The difference between the centerline of a vehicle and the line perpendicular to the rear wheels is called what?
snow_lady [41]
The thrust angle is an imaginary line drawn perpendicular to the rear axle's centerline. It compares the direction that the rear axle is aimed with the centerline of the vehicle. It also confirms if the rear axle is parallel to its front axle and that the wheelbase on both sides of the vehicle is the same.
7 0
3 years ago
The primary source of help for technical problems with BC Online (computer settings, password, etc.) is:
solmaris [256]

The primary source of help for technical problems with BC Online (computer settings, password, etc.) is: The Instructor

<h3>Computer Technical Problems</h3>

         Usually when we have problems on our computers, depending on the type of problem we can call the attention of a technician or follow the advice of an instructor or the message prompt on the software or website.

        However, when it comes to technical problems such as Computer settings or password, we have to make sure we follow the instructions given by the instructor primarily especially because BC Online from the question is a type of Government Registry Information that is used by the citizens with the aid of instructors.

Read more on computer technical problems at;

brainly.com/question/17506968

3 0
2 years ago
Which of the following are advantages of cloud computing?
Leona [35]
Hahahahaha lawllakad
7 0
3 years ago
Read 2 more answers
A table of contents does not _____ automatically [customize table of contents]
anyanavicka [17]

Answer:

update

Explanation:

a table of contents does not update itself automatically.

5 0
3 years ago
What is the input for air cooler computer science​
Maru [420]

Answer:

cooling

Explanation:

Air cooling is a process of lowering air temperature by dissipating heat. It provides increased air flow and reduced temperatures with the use of cooling fins, fans or finned coils that move the heat out of a casing such as a computer …

5 0
2 years ago
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • Which of the following are the dimensions of feasibility? Group of answer choices cost, schedule, technical, and organizational
    14·1 answer
  • The role of Operating system<br><br>​
    6·1 answer
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm th
    14·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    14·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
  • Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical example
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!