1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
13

Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security

Agency Proxy server Electronic Privacy Information Center
Computers and Technology
2 answers:
Goryan [66]3 years ago
5 0

Answer:

The answer is Proxy server.

Explanation:

A proxy server is a server application or device that works as a mediator for clients who are requesting resources from servers that provide those resources. It works for the client when requesting service, potentially hiding the real origin of the request to the resource server.  Proxy server acts as mediator between computer and internet enabling client computers to make indirect connections to other network services.

Instead of directly connecting to a server that can execute a specified function, such as a file or web page, the client guides the request to the proxy server, which reviews the request and executes the necessary network transfers. Client computers first connect to the proxy server, instead of connecting directly to a server for requesting some resources like web pages, a file, videos etc. The proxy server assesses the request and executes or performs the required network processes.

This means when the proxy server receives the resource request from the client computer, it will look for the resources in its hard disk. If the resources are present in the cache already then proxy server will return these resources to the client and if not, then proxy server keeps requesting these resources on client's behalf. When proxy server attains the resource it will cache that resource from remote servers and immediately returns successive request for the same material directly. This is how the complexity of a request is controlled.

Proxy server is being used for several reasons such as sharing Internet connections on a LAN, hiding IP address, performing Internet access control etc.

Advantages of using proxy server:

  • share Internet connection over a LAN.
  • proxy servers speeds up Internet surfing as they fulfill the clients requests directly.
  • can be used for authentication for Internet connection.
  • used for bandwidth control.
  • can be used for internet web filter and content filter.
  • used to avoid security filters e.g. it is used to access blocked websites.
  • to bypass location restrictions e.g. if a server is restricting services to a specific country , the services can be accessed using a proxy.

astraxan [27]3 years ago
4 0

The answer is proxy server

A proxy server acts as an immediate or a gateway between you, the proxy client (example, the browser) and the internet or the destination website that you want to visit. Proxy servers are designed to re-route traffic and obscure source and destination. For instance, if you want to request a page like brainly, a proxy server will be able to retrieve this page for you by providing only its IP address to the site and act as a mediator between clients and the requested server. This however, does not mean that there is no link between you and this website. It means that all the information along with the requests you made will be collected by the proxy server.

You might be interested in
NEED HELP RIGHT NOW!!! Which of the following is the definition of a privacy policy? * 5 points - A legal document that an app o
Marina86 [1]

Answer:

A legal document that an app or a website must provide to describe the rules the company and users must obey when they use the app.

6 0
3 years ago
What is DAP? How LDAP is different from DAP?
lions [1.4K]

Answer: DAP stands for directory access protocol .It is a protocol that is used for accessing the information from the directory of X.500 protocol.

LDAP(Lightweight directory access protocol) is the software protocol that is present for the simplification process of the X.500 protocol and to make it light-weighted .It is basically a version of DAP in a lightweight form.

8 0
4 years ago
Design a hierarchy of classes, where the Media superclass has the artistName and the mediaName as the common attributes. Create
zaharov [31]

Answer:

See attached file.

Explanation:

See attached file for detailed code.

Download txt
7 0
3 years ago
What were black codes?
Lyrx [107]
<span>The Union victory in the Civil War may have given some 4 million slaves their freedom, but African Americans faced a new onslaught of obstacles and injustices during the Reconstruction era (1865-1877). By late 1865, when the 13th Amendment officially outlawed the institution of slavery, the question of freed blacks’ status in the postwar South was still very much unresolved. Under the lenient Reconstruction policies of President Andrew Johnson, white southerners reestablished civil authority in the former Confederate states in 1865 and 1866. They enacted a series of restrictive laws known as “black codes,” which were designed to restrict freed blacks’ activity and ensure their availability as a labor force now that slavery had been abolished. For instance, many states required blacks to sign yearly labor contracts; if they refused, they risked being arrested as vagrants and fined or forced into unpaid labor. Northern outrage over the black codes helped undermine support for Johnson’s policies, and by late 1866 control over Reconstruction had shifted to the more radical wing of the Republican Party in Congress.</span>
8 0
3 years ago
Read 2 more answers
Which type of polish grade uses green-colored connectors to help you keep from using the wrong connector type
Anestetic [448]

Answer:

Medium Grade Liquid Metal Polish. pls give me brainliest

8 0
2 years ago
Other questions:
  • Carolyn owns a small business that designs air conditioning units for large buildings. A construction company that's building an
    13·1 answer
  • Explain which are of the brain you think might light up to show that you are telling a lie and why
    10·1 answer
  • The Left Shift key is used to capitalize which keys?
    5·2 answers
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • Summarizes statistical data ?
    11·1 answer
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • 1. Define lexemes. Give an example of an lexeme in any programming language.<br>​
    10·1 answer
  • 1. Es un símbolo que indica que se ha de realizar cierta operación específica entre uno o varios
    6·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • To find information on a network use a ____
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!