1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
13

Proxy is a network computer that can serve as an intermediary for connecting with other computers.

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
8 0

Answer:Protects the local network from outside access

Explanation:Proxy is a type of serves as the mediator in computer network for connecting the network with the user system. These servers are responsible for maintaining the security against any unauthorized access in the system or internet,privacy and other functions.. It helps in protecting the whole network connection by taking the control at the servers .

You might be interested in
Which header provides functions that deal with exceptional conditions?
Lyrx [107]

Answer:

<exception> header provides functions for exception handling in c++.

Explanation:

Exceptions gives a way to respond to exceptional conditions (like runtime errors) in codes by transferring the control to other special functions called handlers. Since try,catch and throw can work in the iostream header file.To use more functions like unexpected,current_exception,rethrow_exception we need exception header file.

3 0
4 years ago
C. An error that due to wrong input.​
ladessa [460]

c. An error that due to wrong input.

=> Bug

<em>Hope </em><em>it</em><em> is</em><em> helpful</em><em> to</em><em> you</em>

6 0
3 years ago
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
a_sh-v [17]

Answer:

Check sharing rules

Check organization-wide defaults

Check the user s profile for object settings

Explanation:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

6 0
4 years ago
A(n) ______ is a flash memory storage device that contains its own processor to manage its storage.
Ugo [173]
The answer to the fill in the blank is a USB
4 0
3 years ago
A plan to budget time for studying and activities is referred to as a study routine. study habits. study skills. a study schedul
vesna_86 [32]

Answer:

A study routine

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Cameron wants to impress the owner of the company. He creates a graph that shows the improved productivity at the company over t
    13·2 answers
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • Let’s say you are given the task of retouching a famous model’s photograph. To what extent will you retouch the image? In your o
    12·2 answers
  • When you right-click a word with a red squiggly line under it, which of the following displays?
    12·2 answers
  • Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without t
    11·1 answer
  • Help me
    14·1 answer
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • What operation can be performed using the total feature ​
    13·1 answer
  • How does technology affect our daily lives essay
    9·2 answers
  • True or False: Cookies placed on a visitor's browser can include enough information to instruct an ad network which types of pro
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!