1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
13

Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security

Agency Proxy server Electronic Privacy Information Center
Computers and Technology
2 answers:
Goryan [66]3 years ago
5 0

Answer:

The answer is Proxy server.

Explanation:

A proxy server is a server application or device that works as a mediator for clients who are requesting resources from servers that provide those resources. It works for the client when requesting service, potentially hiding the real origin of the request to the resource server.  Proxy server acts as mediator between computer and internet enabling client computers to make indirect connections to other network services.

Instead of directly connecting to a server that can execute a specified function, such as a file or web page, the client guides the request to the proxy server, which reviews the request and executes the necessary network transfers. Client computers first connect to the proxy server, instead of connecting directly to a server for requesting some resources like web pages, a file, videos etc. The proxy server assesses the request and executes or performs the required network processes.

This means when the proxy server receives the resource request from the client computer, it will look for the resources in its hard disk. If the resources are present in the cache already then proxy server will return these resources to the client and if not, then proxy server keeps requesting these resources on client's behalf. When proxy server attains the resource it will cache that resource from remote servers and immediately returns successive request for the same material directly. This is how the complexity of a request is controlled.

Proxy server is being used for several reasons such as sharing Internet connections on a LAN, hiding IP address, performing Internet access control etc.

Advantages of using proxy server:

  • share Internet connection over a LAN.
  • proxy servers speeds up Internet surfing as they fulfill the clients requests directly.
  • can be used for authentication for Internet connection.
  • used for bandwidth control.
  • can be used for internet web filter and content filter.
  • used to avoid security filters e.g. it is used to access blocked websites.
  • to bypass location restrictions e.g. if a server is restricting services to a specific country , the services can be accessed using a proxy.

astraxan [27]3 years ago
4 0

The answer is proxy server

A proxy server acts as an immediate or a gateway between you, the proxy client (example, the browser) and the internet or the destination website that you want to visit. Proxy servers are designed to re-route traffic and obscure source and destination. For instance, if you want to request a page like brainly, a proxy server will be able to retrieve this page for you by providing only its IP address to the site and act as a mediator between clients and the requested server. This however, does not mean that there is no link between you and this website. It means that all the information along with the requests you made will be collected by the proxy server.

You might be interested in
Riser cards on some proprietary systems plug into a unique socket or slot on the motherboard. These are also called________
inysia [295]

Answer: Daughter board

Explanation:

A daughter board is refers to the circuit board and it is basically connected to the motherboard directly without any interruption.

It is also known as a daughter card which plugs and then extended the circuitry by connecting with the another circuit board. A mezzanine card and the riser card are the examples of the daughter board that used in the system.

According to the question, the riser card basically plus into the unique socket or the slot in the board and this is known as the daughter board.

Therefore, Daughter board is the correct answer.          

8 0
4 years ago
______ have become a common and easily created form of malware that are creating using applications such as Visual Basic or VBSc
Helen [10]

Answer:

Macro Viruses

Explanation:

Macro Viruses have become a common and easily created form of malware that are creating using applications such as Visual Basic or VBScript.

7 0
3 years ago
Advertising managers work on websites used in __________?
Elena-2011 [213]
Campaigns

Hope this is right :-;
3 0
3 years ago
Read 2 more answers
In the URL, what is the subdomain and what is the domain name?
timurjin [86]

<u>Answer</u>:

<u>EXAMPLES:</u>

Primary domain name could be “bestwebdesigner.com,”

subdomain to that domain called “blog.bestwebdesigner.com.”

<u>Explanation</u>:

Essentially, a subdomain is a separate part of your website that operates under the same primary domain name.

5 0
4 years ago
Giving away free brainliest
Leni [432]

Answer:

thx

Explanation:

lol

4 0
2 years ago
Read 2 more answers
Other questions:
  • Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP
    12·1 answer
  • Is an important and necessary step that precedes object-oriented programming?
    6·1 answer
  • Which View option allows you to view your document as it would appear when posted online?
    8·1 answer
  • How does the government is i.t to run the country?
    9·1 answer
  • Write a Java Program that can compute the mean, median, the highest, and the lowest of the students’ scores in a class. First, t
    6·1 answer
  • Anyone here codes? <br> C++, C#, Lua? Anything?
    15·2 answers
  • Difference between second and third generation of computer<br>​
    14·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRIST AND CORRECT
    10·2 answers
  • For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastruc
    7·1 answer
  • Why do we need to know the different Networking Devices?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!