1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
4 years ago
8

You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w

ant to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. What should you install and configure?
Computers and Technology
1 answer:
Schach [20]4 years ago
8 0

Answer: Proxy server

Explanation: Proxy server is a type of server that is acts as interface between the network on huge scale and any local network. This server provides the feature of security, operations, privacy etc in the network system. They also help in improving the performance of the network.

It can work as the web filter to eliminate the unwanted websites.They acts as the gateway by  observing the website that is being browsed by the other user.Thus installation of proxy server should implemented on the organization.

You might be interested in
Which of the following are ways companies gather customer feedback?
Serjik [45]

Answer:

All of the above is the correct answer.

6 0
3 years ago
Read 2 more answers
Write a function that finds the number of occurrences of a specified character in the string using the following header: def cou
Ludmilka [50]

Answer:

def count(userInput, character):

   occurrences = 0

   for character_in_string in userInput:

       if(character == character_in_string):

           occurrences += 1

   return occurrences

userInput = input("Enter string: ")

character = input("Enter character: ")[0]

print(count(userInput, character))

Explanation:

  • Define a count function that takes in the userInput as a string and character parameters.
  • Loop through the userInput and check whether selected character is equal to the character found in the string.
  • Increase the counter of occurrences by 1 if the condition is true and then return the occurrences.
  • Take the userInput and character as input from the user.
  • Finally display the results by calling the count function.
6 0
3 years ago
Which tab should gemima use to open the formula dialog box
weeeeeb [17]

Answer:

you shouldn't being using this site to cheat on your test its supposed to help you study and understand how to do it

Explanation:

4 0
3 years ago
Read 2 more answers
By recording where a hockey puck goes into a net, a goalie can...
Paraphin [41]

Answer:

2. determine where they are not successfully blocking goals.

Explanation:

In the game of ice hockey, a goalie also referred to as goaltender refers to an individual (player) who is saddled with the responsibility of preventing the hockey puck from going into his or her net. When the hockey puck is prevented by the goalie, it simply means that the opposing team is prevented from having a goal or scoring.

The area in front of the net where a goalie plays is known as goal crease.

By recording where a hockey puck goes into a net, a goalie can determine where they are not successfully blocking goals because it helps them to see where they successfully made a save (block) and where they did not.

8 0
3 years ago
Read 2 more answers
In order to manage information for a company, your website would need a/an
Eva8 [605]
The answer is database.
3 0
3 years ago
Other questions:
  • "This command will give you a listing of your basic IP information for the computer you are using"
    6·1 answer
  • Which of the following is false?
    7·1 answer
  • Software that people commonly use in the workplace to make their lives easier is called
    15·1 answer
  • What type of software translates a programmer’s statements to binary form?
    10·1 answer
  • While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
    8·1 answer
  • The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
    5·1 answer
  • Successful Alignment of IT with Business/Project Prioritization Refer to the readings for this week on aligning IT to the busine
    10·1 answer
  • All of these (except the ______) go unnoticed by the computer
    7·1 answer
  • There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
    8·1 answer
  • Explain the working principal of computer system with suitable diagarm​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!