1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
4 years ago
6

A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has be

en told that all Internet access should go through a single computer so incoming and outgoing traffic can be screened and only that computer should have an address revealed to the Internet. What should the administrator set up?
Computers and Technology
1 answer:
scoundrel [369]4 years ago
3 0

Answer:

Proxy Server.

Explanation:

An administrator was given the responsibility of customizing Internet connection for around the numbers of computer systems. He stated the admin that those Internet connections need to go through a system connected to the internet because otherwise inbound and outbound traffic can still be examined but only that systems should have a Web address identified.

So, the admin configured Proxy Server because only certain systems have been identified the following address to the internet.

You might be interested in
Rebecca is an interior designer. What is her job role? need this asap
Solnce55 [7]
B. to decorate and renovate homes
5 0
3 years ago
The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questionin
iragen [17]

Answer:

Power cycle the printer

Explanation:

To power cycle a device means to turn it off and turn it back on again.This might mean switching the power to OFF and then ON again or may require physically unplugging the device and then plugging it back in again.Power cycling the device erases the RAM and allows it to boot up with fresh information.

Typically it is a good idea to wait 5 to 10 seconds before turning the device back on to make sure it has chance to fully reset.

3 0
3 years ago
Read 2 more answers
To open computer manger you would
Irina18 [472]
"start", "control panel", "administrative tools", "computer management" thats it
8 0
3 years ago
discuss the advantages and disadvantages that Excel has in helping navigate databases, big data, and data analytics.
posledela

Answer:

 The main advantage of using the the excel that help in navigating the databases and helps in data analytics. It basically exploring huge information and databases are predominantly the information purging methods in exceed expectations which aides in preparing information in an expedient and proficient way.

The information purging procedure incorporate VBA macros or rotate tables, mapping instruments, report causing utilizing progressed to exceed expectations devices and furthermore has the upside of reconciliation with different virtual products.

The disadvantage are as follows:

  • It is difficult for sharing the spreadsheet in the system.
  • It also face difficulty while observing the any type of the regular tends in the given data.

5 0
3 years ago
The text size can be found in ?
Greeley [361]

Answer:

Microsoft word.

Explanation:

i am very sorry if the answer is wrong

3 0
3 years ago
Other questions:
  • Special characters that display on the screen but do not print are called _____________
    15·1 answer
  • What is a characteristic of high-level computer programming languages?
    8·1 answer
  • The _____ unit is the preferred style unit for web page text because it makes it easy to develop pages in which different page e
    10·2 answers
  • Se Statements
    6·1 answer
  • ¿Por qué es importante generar proyectos innovadores?
    8·1 answer
  • Select the correct answer.
    6·2 answers
  • What is the lower House​
    7·1 answer
  • How do web-based applications and websites differ? (2 points)
    13·1 answer
  • What is the full form of MPEG?<br> The full form for MPEG is ________.
    9·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!