1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
2 years ago
13

Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security

Agency Proxy server Electronic Privacy Information Center
Computers and Technology
2 answers:
Goryan [66]2 years ago
5 0

Answer:

The answer is Proxy server.

Explanation:

A proxy server is a server application or device that works as a mediator for clients who are requesting resources from servers that provide those resources. It works for the client when requesting service, potentially hiding the real origin of the request to the resource server.  Proxy server acts as mediator between computer and internet enabling client computers to make indirect connections to other network services.

Instead of directly connecting to a server that can execute a specified function, such as a file or web page, the client guides the request to the proxy server, which reviews the request and executes the necessary network transfers. Client computers first connect to the proxy server, instead of connecting directly to a server for requesting some resources like web pages, a file, videos etc. The proxy server assesses the request and executes or performs the required network processes.

This means when the proxy server receives the resource request from the client computer, it will look for the resources in its hard disk. If the resources are present in the cache already then proxy server will return these resources to the client and if not, then proxy server keeps requesting these resources on client's behalf. When proxy server attains the resource it will cache that resource from remote servers and immediately returns successive request for the same material directly. This is how the complexity of a request is controlled.

Proxy server is being used for several reasons such as sharing Internet connections on a LAN, hiding IP address, performing Internet access control etc.

Advantages of using proxy server:

  • share Internet connection over a LAN.
  • proxy servers speeds up Internet surfing as they fulfill the clients requests directly.
  • can be used for authentication for Internet connection.
  • used for bandwidth control.
  • can be used for internet web filter and content filter.
  • used to avoid security filters e.g. it is used to access blocked websites.
  • to bypass location restrictions e.g. if a server is restricting services to a specific country , the services can be accessed using a proxy.

astraxan [27]2 years ago
4 0

The answer is proxy server

A proxy server acts as an immediate or a gateway between you, the proxy client (example, the browser) and the internet or the destination website that you want to visit. Proxy servers are designed to re-route traffic and obscure source and destination. For instance, if you want to request a page like brainly, a proxy server will be able to retrieve this page for you by providing only its IP address to the site and act as a mediator between clients and the requested server. This however, does not mean that there is no link between you and this website. It means that all the information along with the requests you made will be collected by the proxy server.

You might be interested in
WHAT THE DEFINITION OD ENGINEER. No CHEAT
Harrizon [31]
A person who designs, maintains or builds machines.
4 0
3 years ago
Read 2 more answers
Do you think our attitude (whether positive or negative) is something we are born with or that we have power to control within o
maks197457 [2]

Answer:

Yes. I do believe that having a positive attitude about our current situation helps with over coming the struggles of it all.

Explanation:

i once had a negative out look on this online school but now that we've reached the end (at my school I've recognized it wasn't too bad after all while doing the work I've learned it helps to listen to some music or watch an video or two from one of my favorite you-tubers and also talking to my friends through apps.

hope this helps.

8 0
3 years ago
Read 2 more answers
Which of the following is not a good technique for photographing groups? Visiting the location.
algol13
I think it's wait until you get started to decide on the props and camera settings...
4 0
3 years ago
Convert<br> 0.625 to binary
Anastaziya [24]

\huge{ \rm{Question:}}

Convert

0.625 to binary

\huge{ \rm{Answer:}}

Translate 0.625 into a fraction. We all know that 0.5 is ½. We know that the remainder, 0.125, is ⅛. Add them together, and you get ½ + ⅛ = ⅝.

Now, in binary, the positions to the right of the point are , which is ½, ¼, and ⅛ respectively.

⅝ is 5 × ⅛. 5 in binary is 101. So, ⅝ is

= 0.101

8 0
2 years ago
Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and
Ann [662]
Due to it's typically massive size, WAN's are almost always slower then a LAN. The further the distance, the slower the network. One of the big disadvantages to having a WAN is the cost it can incur. Having a private WAN can be expensive.
3 0
2 years ago
Other questions:
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • Complete the sentence about a focusing technique.
    7·1 answer
  • What is secondary exchange ? - Apex
    14·1 answer
  • Create an instance of your queue that accepts java.lang.String Objects. Starting with an empty queue, use the enqueue(E e) metho
    15·1 answer
  • Software is nothing but a piece of code or set of instructions written in a chip to run a hardware device on the Computer. O Tru
    14·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • I need 3 sentences on adware.<br> What they do and how they are a risk.
    5·1 answer
  • In online education is intrinsically related to equity. Professionalism Communication Accessibility
    8·2 answers
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Which of the following helps you plan out every step of an animation?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!