1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
9

__________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t

ravels over the public Internet does not reveal the address structure of the internal network to outsiders.
Computers and Technology
1 answer:
Agata [3.3K]3 years ago
3 0

Answer:

Proxy server.

Explanation:

Proxy server can be used to replace internal network addresses with one or more different addresses so the traffic that actually travels over the public Internet does not reveal the address structure of the internal network to outsiders.

You might be interested in
Five advantages of Internet​
Novosadov [1.4K]

Answer:

Information, knowledge, and learning.

Selling and making money.

Banking, bills, and shopping.

Donations and funding

Entertainment.

Explanation:

I hope this helps! ^^

☁️☁️☁️☁️☁️☁️☁️

7 0
2 years ago
Read 2 more answers
Which of the following reflects Moore's law? Multiple Choice The doubling of computer chip performance per dollar every two year
Katena32 [7]

Answer:

The correct answer is A.

Explanation:

Moore's Law states/predicts that the maximum number of transistors that can be used on integrated circuits (processors etc.) will be doubled every two years so it basically predicts an exponential growth in terms of transistors used.

Doubling the number of transistors used means that it will almost certainly increase the performance of the processors. Of course there are a lot of other variables that the performance depends on but Moore's Law is proven to be true and  is being used since 1960's. The answer given in option A is the one that best reflects on this law.

I hope this answer helps.

4 0
3 years ago
Write the declaration statement for a two-dimensional array X of integers with five rows and five columns that accepts 25 intege
madreJ [45]

Answer:

int[ ][ ] X = new int[5][5];

It can also be declared and initialized this way:

  int[][] X = {

               {1,2,3,6,8},

               {4, 5, 6, 9},

               {7,5,6,8,9},

               {8,5,8,8,9},

               {10,2,6,8,11},

       };

Explanation:

Above is a declaration of a two-dimensional array that can hold 5*5=25 int values. A java program is given below:

public class JavaTwoD{

   public static void main(String args[ ]) {

       // creating the 5X5 array

       int[ ][ ] X = new int[5][5];

       // looping through the array to add elements

       for (int i = 0; i < X.length; i++) {

           for (int j = 0; j < X[i].length; j++) {

               X[i][j] = i * j;

           }

       }

5 0
3 years ago
Write a set of instructions (the code) to prompt the user for an int value and input it using the Scanner class into the variabl
JulsSmile [24]

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     int x = scan.nextInt();

     int y = scan.nextInt();

   }

}

I hope this helps!

6 0
2 years ago
Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which fi
Ray Of Light [21]

Answer:

ZIP

Explanation:

The best file type for this scenario would be a ZIP file. This is a file that holds various different files compressed into a single file, with a file extension of .zip . This file type is used for two main reasons, the first being to combine various files into a single file that can be easily sent or stored. The second reason is to shrink the total file size of a large set of files, which is done by compressing the files themselves into a single entity. Therefore, this would be the best option for Eli in this situation.

5 0
2 years ago
Other questions:
  • Food is shipped thousands of miles throughout our country using various types of transportation such as trucks, planes, and boat
    10·1 answer
  • What kind of software consists of the programs that control or maintain the operations of a computer and its devices?
    11·1 answer
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • Where can I watch infinity war for free?
    9·1 answer
  • Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
    5·1 answer
  • in java how do i Write a Java program that takes ten numbers as input to calculate and print the average of the numbers.
    11·1 answer
  • The full meaning of ENIAC,ABACUS,EDVAC,EDSAC<br>and explain ​
    7·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is p
    15·1 answer
  • A global clothing company is looking to create a more immersive shopping experience for customers.What is a way the company can
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!