1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
3 years ago
11

Question 1 :The most common business firewall technique is to use a firewall server in conjunction with:This task contains the r

adio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt 1 to alt 9. A an encryption key. B a screen saver. C a proxy server. D an anti-virus program.
Computers and Technology
1 answer:
Dmitrij [34]3 years ago
4 0

Answer:

The correct answer to the following question is "Option C".

Explanation:

Those other machines are using the proxy server to browse Web pages. If a Page is submitted by some other device, it is accessed by the proxy server before being sent to the requester.

  • It is quite a role would be to maintain or hold the secret of the device because of security reasons behind it.
  • Using a firewall application in combination with: This function includes the radio switches including choice checkboxes has been the most standard business firewall methodology.

The other three options are inappropriate because they are not related to the firewall methodology. That's why option C is the right answer.

You might be interested in
Please define processor​
fredd [130]
Processor means to break down something.
6 0
3 years ago
Create a Java program with threads that looks through a vary large array (100,000,000 elements) to find the smallest number in t
olchik [2.2K]

Answer:

See explaination

Explanation:

import java.util.Random;

public class Sample{

static class MinMax implements Runnable{

int []arr;

int start,end,min,max;

MinMax(int[]arr, int start,int end){

this.start=start;

this.end=end;

min=Integer.MAX_VALUE;

max=Integer.MIN_VALUE;

this.arr=arr;

}

atOverride

public void run() {

for(int i=start;i<=end;i++){ //search min and max form strant to end index

min=Math.min(min,arr[i]);

max=Math.max(max, arr[i]);

}

}

}

public static void main(String[] args) throws Exception{

long beginTime = System.nanoTime();

Random gen = new Random();

int n=100000000;

int[] data = new int[n]; //generate and fill random numbers

for(int i = 0; i < data.length; i++) {

data[i] = gen.nextInt()%1000000;

}

long endTime = System.nanoTime();

System.out.println("Done filling the array. That took " + (endTime - beginTime)/1000000000f + " seconds.");

//-----------------------------------------

System.out.println("Using 1 thread"); //1 thread

MinMax m1=new MinMax(data,0,n-1); //class object

Thread t1=new Thread(m1); //new thread

beginTime=System.nanoTime(); //start timer

t1.start(); //start thread

t1.join(0); //wait until thread finishes

endTime=System.nanoTime(); //end timer

System.out.println("Min,Max: "+m1.min+","+m1.max); //print minimum and maximum

System.out.println("Time using 1 thread " + (endTime - beginTime)/1000000000f + " seconds."); //print time taken

//-----------------------------------------

System.out.println("Using 2 thread");

m1=new MinMax(data,0,n/2);

MinMax m2=new MinMax(data,n/2+1,n-1);

t1=new Thread(m1);

Thread t2=new Thread(m2);

beginTime=System.nanoTime();

t1.start();

t2.start();

t1.join(0);

t2.join(0);

endTime=System.nanoTime();

System.out.println("Min,Max: "+ Math.min(m1.min,m2.min)+","+Math.max(m1.max,m2.max));

System.out.println("Time using 2 thread " + (endTime - beginTime)/1000000000f + " seconds.");

//-----------------------------------------

System.out.println("Using 3 thread");

m1=new MinMax(data,0,n/3);

m2=new MinMax(data,n/3+1,2*n/3);

MinMax m3=new MinMax(data,2*n/3+1,n-1);

t1=new Thread(m1);

t2=new Thread(m2);

Thread t3=new Thread(m3);

beginTime=System.nanoTime();

t1.start();

t2.start();

t3.start();

t1.join(0);

t2.join(0);

t3.join(0);

endTime=System.nanoTime();

System.out.println("Min,Max: "+ Math.min(Math.min(m1.min,m2.min),m3.min)+","+Math.max(Math.max(m1.max,m2.max),m3.max));

System.out.println("Time using 3 thread " + (endTime - beginTime)/1000000000f + " seconds.");

//-----------------------------------------

System.out.println("Using 4 thread");

m1=new MinMax(data,0,n/4);

m2=new MinMax(data,n/4+1,2*n/4);

m3=new MinMax(data,2*n/4+1,3*n/4);

MinMax m4=new MinMax(data,3*n/4+1,n-1);

t1=new Thread(m1);

t2=new Thread(m2);

t3=new Thread(m3);

Thread t4=new Thread(m4);

beginTime=System.nanoTime();

t1.start();

t2.start();

t3.start();

t4.start();

t1.join(0);

t2.join(0);

t3.join(0);

t4.join(0);

endTime=System.nanoTime();

System.out.println("Min,Max: "+ Math.min(Math.min(m1.min,m2.min),Math.min(m3.min,m4.min))+","+Math.max(Math.max(m1.max,m2.max),Math.max(m3.max,m4.max)));

System.out.println("Time using 4 thread " + (endTime - beginTime)/1000000000f + " seconds.");

}

}

6 0
3 years ago
An online apparel website aims to rank on top in the search engine results. Which technique will help the business list itself a
Alex

Answer:

A. using exclusive keywords such as "leather jacket" in an image

Explanation:

A. is the correct answer. This is because generic keywords are hard to be ranked for, as they are general for all. And using exclusive keywords like "while winter jacket" will do but if we use even better keywords like the leather jacket with image will work even better, as Google prefers the images, and as an example an infographic over an article. And it prefers a video over an image, and so forth. And never ever link to phishing websites, the Search engine will ban you.

8 0
4 years ago
Read 2 more answers
Competition between individuals in a population is due to (2 points)
madam [21]
Competition between individuals in a population is due to (2 points)
limited resources
5 0
4 years ago
This is my new horrible subject lol
Gre4nikov [31]
It's b...............
6 0
3 years ago
Other questions:
  • Respond to the following in a paragraph of no less than 125 words. What is the purpose of netiquette guidelines?
    10·1 answer
  • Suppose there is a class Roster. Roster has one variable, roster, which is a List of tuples containing the names of students and
    6·1 answer
  • When can designers use rapid application development? HELP ASAP
    13·1 answer
  • Give two reasons to break up
    11·2 answers
  • A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
    8·1 answer
  • What does RFID use for wireless communication?<br> Infrared<br> IoT<br> Smart chip<br> Tag
    14·1 answer
  • There is only one way to change line spacing in Word.
    14·1 answer
  • a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers
    7·1 answer
  • Write the names of different types of communication.​
    15·2 answers
  • Differentiate between off the shelf software and bespoke software
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!