1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
5

A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s

erve requests to users who are connecting to your web server. What type of network area or zone should be set up?
1. DMZ
2. Extranet
3. FTP
4. VPN
Computers and Technology
1 answer:
andreev551 [17]3 years ago
3 0

Answer:

1. DMZ  (Demilitarized zone)

Explanation:

In computer networking, a Demilitarized Zone is a physical or logical network designed to give an extra layer of security on the organization’s private network. The DMZ acts as an interface between an untrusted network such as the internet and the organization’s internal network. When a server is set up in a demilitarized zone, users can reach it via its public IP address. In case there is an attack on the server, the private network is still protected.

You might be interested in
g Suppose the vertex data is stored in an array named verts and each vertex uses a list to store the coordinates. Write the code
kodGreya [7K]

Answer:

function createAndFillBufferObject(gl, data) {

 var buffer_id;

 // Create a buffer object

 buffer_id = gl.createBuffer();

 if (!buffer_id) {

   out.displayError('Failed to create the buffer object for ' + model_name);

   return null;

 }

 // Make the buffer object the active buffer.

 gl.bindBuffer(gl.ARRAY_BUFFER, buffer_id);

 // Upload the data for this buffer object to the GPU.

 gl.bufferData(gl.ARRAY_BUFFER, data, gl.STATIC_DRAW);

 return buffer_id;

}

3 0
3 years ago
Atieno is a musician who records music on her computer. Which devices do you think she would need the most?
AURORKA [14]

Answer:

Midi Synthesizer, Mic,Boom Mic, Laptop

Explanation:

At the end of the day a keyboard and a pc is all you need as the keyboard alone can cover nearly any instrument.

8 0
3 years ago
What is the output produced from the following statements? System.out.println("\"Quotes\""); System.out.println("Slashes \\//");
jekas [21]

Answer:

"Quotes"

Slashes \//

How '"confounding' "\" it is!

Explanation:

The question above is testing your knowledge of  the "\" escape sequence, This escape sequence is used to introduce special formatting to the output of the System.out.print function in Java.

It can be used to introduce a new line \n

It can also be used to introduce a tab indentation \t

As in the question above it is used to introduce double quotes "" in this case \"

Also as we see the question above it can still be used to place backlashes to an output in this case we use two backlashes \\. The first is the escape sequence, the second \ gets printed out.

3 0
3 years ago
Which disclosure paradigm has as its assumptions that 1) an attacker will learn little or nothing from disclosure; 2) Disclosure
nekit [7.7K]

The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

<h3>What is open source?</h3>

An  Open source is known to be a term that connote that is said to be an Open source software set up to be publicly used by people.

Therefore, The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

Learn more about Open source from

brainly.com/question/6065176

#SPJ1

3 0
2 years ago
first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.
pshichka [43]

#4 is true

We use pseudocode to help us understand code.

#5 is false

Strings are surrounded by quotes, integers are not.

#6 is 100.

Integers are numbers with no decimal places.

3 0
3 years ago
Other questions:
  • Informs the network interface card to pass packets sent to that address to the ip stack so their contents can be read, and tells
    9·1 answer
  • If you want to copy text formatting from one area of your document to another area, _____. a. select the formatting you would li
    5·1 answer
  • What is meant by backing up files through cloud computing?
    5·2 answers
  • It is a JavaScript property used to call a function after a specified time, in milliseconds​
    9·2 answers
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • An epic games service is unavailable at the moment
    8·1 answer
  • the image on the right was prooduced by a computer. it shows a complex molecu;e consisting of many atoms. what would be an advan
    6·1 answer
  • Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but befor
    5·1 answer
  • Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction stor
    12·1 answer
  • even if we reach that state where an AI can behave as human does,how do we measure if AI is acting like a human?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!