1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
13

Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security

Agency Proxy server Electronic Privacy Information Center
Computers and Technology
2 answers:
Goryan [66]3 years ago
5 0

Answer:

The answer is Proxy server.

Explanation:

A proxy server is a server application or device that works as a mediator for clients who are requesting resources from servers that provide those resources. It works for the client when requesting service, potentially hiding the real origin of the request to the resource server.  Proxy server acts as mediator between computer and internet enabling client computers to make indirect connections to other network services.

Instead of directly connecting to a server that can execute a specified function, such as a file or web page, the client guides the request to the proxy server, which reviews the request and executes the necessary network transfers. Client computers first connect to the proxy server, instead of connecting directly to a server for requesting some resources like web pages, a file, videos etc. The proxy server assesses the request and executes or performs the required network processes.

This means when the proxy server receives the resource request from the client computer, it will look for the resources in its hard disk. If the resources are present in the cache already then proxy server will return these resources to the client and if not, then proxy server keeps requesting these resources on client's behalf. When proxy server attains the resource it will cache that resource from remote servers and immediately returns successive request for the same material directly. This is how the complexity of a request is controlled.

Proxy server is being used for several reasons such as sharing Internet connections on a LAN, hiding IP address, performing Internet access control etc.

Advantages of using proxy server:

  • share Internet connection over a LAN.
  • proxy servers speeds up Internet surfing as they fulfill the clients requests directly.
  • can be used for authentication for Internet connection.
  • used for bandwidth control.
  • can be used for internet web filter and content filter.
  • used to avoid security filters e.g. it is used to access blocked websites.
  • to bypass location restrictions e.g. if a server is restricting services to a specific country , the services can be accessed using a proxy.

astraxan [27]3 years ago
4 0

The answer is proxy server

A proxy server acts as an immediate or a gateway between you, the proxy client (example, the browser) and the internet or the destination website that you want to visit. Proxy servers are designed to re-route traffic and obscure source and destination. For instance, if you want to request a page like brainly, a proxy server will be able to retrieve this page for you by providing only its IP address to the site and act as a mediator between clients and the requested server. This however, does not mean that there is no link between you and this website. It means that all the information along with the requests you made will be collected by the proxy server.

You might be interested in
Discuss what repetitions structures are, and how they differ from the vectorization approaches we have previously studied in the
gogolik [260]

Repetition structures, or loops, are used when a program needs to repeatedly process one or more instructions until some condition is met, at which time the loop ends. Many programming tasks are repetitive, having little variation from one item to the next. Vectorized mathematical code appears more like the mathematical expressions found in textbooks, making the code easier to understand. That is the difference. Hope I could help you on Brainly.com!

6 0
4 years ago
you are the manager of a virtual team that is working on a project. You uploaded a Word document to an OneDrive account that you
Valentin [98]

He can simply right click on the file and select restore previous versions. Instead of the manager choosing to recreate the Word document from scratch, he can recover the initial and previous version of the file. Once he has clicked the “Restore previous versions” option, a list of available items will pop. He will click the version he would like restored and click “Restore”

6 0
3 years ago
What are the 6 external parts of a computer system
denis23 [38]
1. Monitor
2.C.P.U
3.Mouse
4. Keyboard
5. Printer
6. Speaker
4 0
3 years ago
A case competitions database:You work for a firm that has decided to sponsor case competitions between teams of college business
Strike441 [17]

Answer:

We will ned (4) four tables.

Explanation:

For the given scenario we will have to build a relational database. The database will have four tables i.e. Competation, Collage, Team and student.

For each table the database fields are mention below. Note that foreign keys are mentioned in itallic.

Competition:

Competition_ID, Competition_Name, Competition_Data, Competition_Name _of_Branch, <em>College_ID</em>

<em />

Collage:

Collage_ID, Collage_Name, Collage_Contact, Collage_address

Team:

Name, Color, <em>Team_ID, College_ID, Competition_ID</em>

<em />

College:

Student_ID, First_Name, Last_Name, Date_of_Birth, Major, Expected_Gradiuation_Date, <em>Collage_ID, Team_ID, Competation_ID</em>

3 0
3 years ago
Which of the following symbols is a part of all spreadsheet functions?
NARA [144]

Answer:

the answer is B and is part of all spreadsheet functions

8 0
3 years ago
Read 2 more answers
Other questions:
  • You notice that lately your computer has been running slow. When you open up your web browser, you get endless pop-up ads to the
    8·1 answer
  • When sending an electronic cover letter, an e-mail address is sufficient contact information.
    10·2 answers
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Im being timed please help!!
    7·2 answers
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • Technologies are having a negative impact on businesses.
    8·1 answer
  • Identify a characteristic of electronic meeting systems.
    10·1 answer
  • Write a program that takes paragraph from the user and prints all unique words in that paragraph using strings in c++
    5·1 answer
  • How can i fix a all white phone screen
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!