1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
3 years ago
11

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly deliv

ered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?
a. file server
b. DNS server
c. DHCP server
d. proxy server
Computers and Technology
1 answer:
slamgirl [31]3 years ago
8 0

Answer:

Option d: proxy server

Explanation:

A proxy server is a intermediary server which acts as a gateway between end users and the internet. It separate end users from the websites they browse. When a web request is sent, the request flows through the proxy server and then only reach the target web server. The requested data will then be sent back through the same proxy server and then forwarded to user.

Nowadays,  proxy servers do much more than forwarding web requests. Proxy servers also cache data to accelerate common requests and at the same time to reduce the burden on the external network connection to the Internet.

You might be interested in
Write a statement that reads 5 successive integers into these variables that have already been declared: x1, x2, x3, x4, x5. The
prisoha [69]

Answer:

Following are the statement in C++ language :

#include <iomanip> // header file  

using namespace std; // namespace

int main() // main method  

{

   int x1,x2,x3,x4,x5; // variable declaration

cout<<" Enter the 5 sucessive integer:";

cin>>x1>>x2>>x3>>x4>> x5; // taking 5 input from user

cout<<right;

// prints each  of  its own line and form a right-justified  

cout<<setw(5)<< x1 << "\n" << setw(5) << x2 << "\n" <<setw(5) << x3 << "\n" << setw(5) << x4 << "\n" << setw(5) << x5 << "\n";

return(0);    

}

Output:

Enter the 5 sucessive integer: 45

23

445

6

8

 

  45

  23

 445

   6

   8

Explanation:

Description of program is given below  

  • Declared a 5 integer value x1,x2,x3,x4,x5 respectively.
  • Read the 5 integer value from user by using cin funtion.
  • Finally Print these 5 value in its own line and form a right-justified by using setw() function on it
5 0
3 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small,
LiRa [457]

Answer:

d.) Service-Oriented Architecture

Explanation:

Because its definition matches

4 0
3 years ago
1. Very short questions.(any four) 14)<br>a. Write down the working principle of a computer.​
Oxana [17]

Answer:

The answer is below

Explanation:

Computer System is widely known for its ability to perform its functions faster by giving out information.

The computer system operation follows certain principles, some of which are:

1. It makes use of the OPERATING SYSTEM to link the hardware and the software together, without it, the computer system is useless.

2. It works with INPUT DEVICES such as keyboards or stylus. Without input devices, there is no way humans can communicate with the computer system

3. It works with OUTPUT DEVICES such as monitors and speakers. Without output devices, there is no way computers can communicate or give back information to humans.

4. It works with the NETWORK such as LAN or WIFI to provides the sharing of data files to other users or computers. Without the network, the computer system can only work within certain spaces, with no way to share data or files with others far away.

6 0
3 years ago
Identify two different uses/applications of data in which biases in word embeddings might cause significant ethical harms, then
olchik [2.2K]

The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:

  • Class immobility
  • Systemic racism

<h3>What are the biases in word embedding?</h3>

Word embeddings is known to be made up of a high level bias such as group stereotypes and prejudice.

The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:

Class immobility
  • Systemic racism

Learn more about biases from

brainly.com/question/24491228

#SPJ1

4 0
3 years ago
Other questions:
  • Which of the following is not an impact device?<br> Joy Stick<br> Track Ball<br> Mouse<br> Printer
    10·1 answer
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • What is the purpose of system calls, and how do system calls relate to the OS and to the concept of dual-mode (kernel-mode and u
    14·1 answer
  • When you write a C# program that stores a value in a variable, you are using temporary storage; the value you store is lost when
    12·1 answer
  • What would be the most popular piece of technology on Earth?
    11·2 answers
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • What is text box and label control​
    10·2 answers
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • In which ways can governments manipulate the media? Select 3 options.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!