1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
13

Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security

Agency Proxy server Electronic Privacy Information Center
Computers and Technology
2 answers:
Goryan [66]3 years ago
5 0

Answer:

The answer is Proxy server.

Explanation:

A proxy server is a server application or device that works as a mediator for clients who are requesting resources from servers that provide those resources. It works for the client when requesting service, potentially hiding the real origin of the request to the resource server.  Proxy server acts as mediator between computer and internet enabling client computers to make indirect connections to other network services.

Instead of directly connecting to a server that can execute a specified function, such as a file or web page, the client guides the request to the proxy server, which reviews the request and executes the necessary network transfers. Client computers first connect to the proxy server, instead of connecting directly to a server for requesting some resources like web pages, a file, videos etc. The proxy server assesses the request and executes or performs the required network processes.

This means when the proxy server receives the resource request from the client computer, it will look for the resources in its hard disk. If the resources are present in the cache already then proxy server will return these resources to the client and if not, then proxy server keeps requesting these resources on client's behalf. When proxy server attains the resource it will cache that resource from remote servers and immediately returns successive request for the same material directly. This is how the complexity of a request is controlled.

Proxy server is being used for several reasons such as sharing Internet connections on a LAN, hiding IP address, performing Internet access control etc.

Advantages of using proxy server:

  • share Internet connection over a LAN.
  • proxy servers speeds up Internet surfing as they fulfill the clients requests directly.
  • can be used for authentication for Internet connection.
  • used for bandwidth control.
  • can be used for internet web filter and content filter.
  • used to avoid security filters e.g. it is used to access blocked websites.
  • to bypass location restrictions e.g. if a server is restricting services to a specific country , the services can be accessed using a proxy.

astraxan [27]3 years ago
4 0

The answer is proxy server

A proxy server acts as an immediate or a gateway between you, the proxy client (example, the browser) and the internet or the destination website that you want to visit. Proxy servers are designed to re-route traffic and obscure source and destination. For instance, if you want to request a page like brainly, a proxy server will be able to retrieve this page for you by providing only its IP address to the site and act as a mediator between clients and the requested server. This however, does not mean that there is no link between you and this website. It means that all the information along with the requests you made will be collected by the proxy server.

You might be interested in
Do the following SQL questions. The resulting columns must all have descriptive names. You must show the result of the query. Fo
Maslowich

Answer:

We can use CREATE command to create tables with columns having descriptive names

Explanation:

Firstly, create a table using CREATE  command in SQL. The syntax is as follows:

CREATE TABLE [table_name]

(

 [col_name] [datatype]),

[col_name] [datatype]),

[col_name] [datatype]),

[col_name] [datatype])

)

Once the table is created, we can insert the data into table using INSERT command. It's syntax is as follows:

INSERT INTO table_name VALUES('', '', '')

if datatype is string, values must be entered within single quotes. If datatype is int, values are entered directly without using  quotes.

Now, you can select the data from  the table using SELECT command. It's syntax is as follows:

SELECT column-list FROM table_name

If you want to filter rows according to conditions, you can use WHERE command.

I have created  sample table and inserted some data into it. Now, I applied some queries on it to select data from the table.

I have written in a text file and attached the same. Please find. Thank you!

Download txt
3 0
3 years ago
Points!!!!!!!! pls help
siniylev [52]
D. Rasterize

This answer makes the most since
7 0
3 years ago
Read 2 more answers
When C++ is working with an operator, it strives to convert operands to the same type. This is known as
ziro4ka [17]

Answer:

The answer is "Option B"

Explanation:

Conversion of type is a way of changing an entity from one data type to another. It is used to make the variable process properly by a function in computer coding.  

In the C++ language, the result of the multitype value added or any other option is the result between those variables as a large type at that time, that's why choice b is correct.

7 0
2 years ago
B. Does “refactoring” mean that you modify the entire design iteratively? If not, what does it mean?
Liono4ka [1.6K]

Explanation:

Refactoring consists of improving the internal structure of an existing program's source code, while preserving its external behavior. 

6 0
3 years ago
I need help plzzzzzzz
Aleonysh [2.5K]

By looking at your code, it seems like you're trying to let the user enter positive numbers until the user enters a negative number. To achieve this, you need to indent int(input("Enter a number, negative to stop")) inside the loop.

The second answer choice is correct.

3 0
3 years ago
Other questions:
  • The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.
    11·1 answer
  • software that instructs the computer how to run applications and controls the display/keyboard is known as the
    11·1 answer
  • Which item refers to an illusion of figures and shapes in motion, which we commonly see in movies and video games?
    9·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • Componets of computer
    5·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled
    10·2 answers
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • How does a modem work​
    13·1 answer
  • Sorry, I cant tell you, you need to know
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!