1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
6

A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has be

en told that all Internet access should go through a single computer so incoming and outgoing traffic can be screened and only that computer should have an address revealed to the Internet. What should the administrator set up?
Computers and Technology
1 answer:
scoundrel [369]3 years ago
3 0

Answer:

Proxy Server.

Explanation:

An administrator was given the responsibility of customizing Internet connection for around the numbers of computer systems. He stated the admin that those Internet connections need to go through a system connected to the internet because otherwise inbound and outbound traffic can still be examined but only that systems should have a Web address identified.

So, the admin configured Proxy Server because only certain systems have been identified the following address to the internet.

You might be interested in
Write an expression that executes the loop while the user enters a number greater than or equal to 0.
LekaFEV [45]

Answer:

while (userNum >=0) {...}

Explanation:

In a <u>while loop</u>, <u>the loop is executed until the condition is false</u>.

Since the loop will execute while the user enters a number greater than or equal to 0 (and that number is declared as <em>userNum</em>), we need to check if <em>userNum</em> is greater than or equal to 0.

4 0
3 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
3 years ago
Let C(x) be the statement "x has a cat," let D(x) be the statement "x has a dog," and let F(x) be the statement "x has a ferret.
allsm [11]

Answer:

See attached for answer and explanation

Explanation:

Note: the question is incomplete, consider the statements below as the statements to be expressed in terms of C(x), D(x), F(x), quantifiers, and logical connectives.

(a) A student in your class has a cat, a dog, and a ferret.

(b)  All students in your class have a cat, a dog, or a ferret.

(c) Some student in your class has a cat and a ferret, but not a dog.

(d) No student in your class has a cat, a dog, and a ferret.

(e) For each of the three animals, cats, dogs, and ferrets, there is a student in your class who has this animal as a pet.

7 0
3 years ago
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Rina8888 [55]

Answer:

a. Checksum

Explanation:

Based on the information provided within the question it can be said that the field that represents this information is called the Checksum. Like mentioned in the question this refers to a value that represents the amount of bits in a certain transmission message. This is done in order to make sure that the amount of bits that were sent match the amount that were received in order to make sure that no data was lost in transit that would cause high-level errors.

7 0
3 years ago
which computer career field enables you to create and design interactive multimedia products and services
dusya [7]
I think its graphic design 
4 0
3 years ago
Other questions:
  • Which of the following is NOT a common GUI component? O a. Label b. Button c. Key press d. Text box
    12·2 answers
  • Can someone please give me a good definition to audience expectations!<br> (in film)
    8·1 answer
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    9·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    7·1 answer
  • Which CSS attribute would change an element's font color to blue
    15·2 answers
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • Suppose that a server sends four packets of audio data, in 15 seconds each. The first is sent by the server exactly at noon (12:
    14·1 answer
  • What is the disadvantage of server based network?
    7·2 answers
  • Please help!!! I am very confused about this question!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!