1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
13

Proxy is a network computer that can serve as an intermediary for connecting with other computers.

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
8 0

Answer:Protects the local network from outside access

Explanation:Proxy is a type of serves as the mediator in computer network for connecting the network with the user system. These servers are responsible for maintaining the security against any unauthorized access in the system or internet,privacy and other functions.. It helps in protecting the whole network connection by taking the control at the servers .

You might be interested in
a ____ is a horizontal or vertical bar that appears when the contents of an area may not be visible completely on the screen.
pav-90 [236]
The answer is a Scroll bar, the description fits perfectly because you need to move it to see more of the content you are viewing, and it wont be completely. when the item does appear completely on screen then the bar is relatively large and there is  no need for scrolling, however the opposite occurs during when you cannot see all of it.
5 0
3 years ago
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
Carl is a music teacher. He builds custom computer systems for his students to use when they are learning and creating music. Ca
shutvik [7]

Answer:

um ahh <em> </em><em>badl</em><em>y</em><em> </em>

Explanation:

i really don't know the answer

4 0
2 years ago
30 POINTS!!
Snowcat [4.5K]

Answer:

paragraph or by a break line space

5 0
3 years ago
The type of materials used in insulators is classified as what
olganol [36]

the answer is Class H

5 0
3 years ago
Other questions:
  • Write a program that inputs a line of text and uses a stack object to print the line reversed.
    14·1 answer
  • Alex leads a team of eight members. Arrange his tasks in sequential order of phases of group dynamics. What are the stages in gr
    13·1 answer
  • Which implementation has the worst time complexity?
    5·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook?
    12·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • Define global variables called highestNum, userInput and sumOfNums and initialize them. In Main call 2 methods: 1) UserData() 2)
    5·1 answer
  • What can hack or code can I use to get a shadow or frost dragon in adopt me
    6·2 answers
  • What does Stand for in web design
    9·1 answer
  • PLEASE HELP! (NO LINKS)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!