1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
14

You are installing several servers that will be used as web servers to reach customers over the Internet. Where should you place

the servers?
proxy area

DMZ

internal network

external network
Computers and Technology
1 answer:
just olya [345]3 years ago
4 0

Answer: DMZ

Explanation:

 DMZ is the demilitarized zone network and it is use in providing he various services to the users or customers by using the public internet. It basically contain organizational services in the logical and physical sub-network and usually works in large network.

The main purpose of DMZ that it is use as web server over the internet for reaching to the users and customers. It also add one additional layer in the organization for security purpose.

Some of the services that DMZ provides as web server, DNS and proxy server.  

You might be interested in
Which of the following methods is a static method? The class in which the method is defined is given in parentheses following th
maw [93]

Answer:

C. sqrt(Math)

Explanation:

All but one of options A to E are is not a static method.

Only option C is a static method. The sqrt() is a static method of Math, that can always be used as Math.sqrt() is used;

The Math class defines all of its methods to be static. Invoking Math methods is done by using Math as a method rather than a variable of type Math; this means that sqrt(Math) doesn't rely on instance variables and don't need to be overridden, unlike others.

Lastly, sqrt(Math) is a static method because unlike other options, it is an utility method, and it is relevant to computations on primitive data types.

The purpose of the static method is in large part to offer a standard library of functions, and it doesn't need to be applied directly to an object.

4 0
3 years ago
A cyberbully is someone who invades another person’s privacy by
e-lub [12.9K]
Insulting or harassing them over the Internet
8 0
4 years ago
Read 2 more answers
Definition of the term social factor and explain why texting while driving can be classified as a social factor causing accident
sergij07 [2.7K]
Social factor - Something that affects you!
Texting and driving is classified as a social factor because your phone is the reason why you crashed your car.
8 0
3 years ago
Nancy malone works for a california-based computer manufacturer. according to nancy, the time required to develop a new product
AleksAgata [21]
I am completely sure that <span>according to Nancy, the time required to develop a new product has decreased because of the increased use of CAM software. CAM (Computer-aided manufacturing) is the application that is needed to enhance manufacturing by linking computer numerical control (CNC) machines to control production process automatically. It improves manufacturing control because it's fully automated.</span>
4 0
3 years ago
7.6 LAB: Checker for integer string Forms often allow a user to enter an integer. Write a program that takes in a string represe
Evgen [1.6K]

Answer:

Following are the program in the Python Programming Language:

def check(num): #define function

 if(num.isdigit()): #set if statement

   return "yes"; #return yes if condition is true

 else:  

   return "no";# return no if condition is false

string=input("Enter the numbers 0-9: ") #get input from the user

print(check(string)) #print and call the function

Output:

Enter the numbers 0-9: 1995

yes

Enter the numbers 0-9: 42,000

no

Explanation:

Here, we define a function "check()" and pass an argument in its parameter "num" inside the function.

  • we set if-else conditional statement and check the value stored in the variable "num" is the digit by using built in function "isdigit()" then return "yes".
  • Then, otherwise it return "no".

Finally, we get the input from the user in the variable "string" then, we call the function through "print()" function.

7 0
4 years ago
Other questions:
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • Write a program that asks the user to enter two numbers,obtains the two numbers from the user and prints the sum,product,
    6·1 answer
  • 2. Design a class named Sandwich with data fields for description and price. Include a constructor that requires arguments for b
    14·1 answer
  • What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and
    10·1 answer
  • Rachelle is an office manager for an active real estate agency. She’s overseeing a transition to a more complete reliance on ele
    9·1 answer
  • What is ODBC? How is it related to SQL/CLI? 10.2. What is JDBC? Is it an example of embedded SQL or of using function calls? 10.
    8·1 answer
  • Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
    9·1 answer
  • What is a computer modem?​
    9·1 answer
  • What is the full form of SAARC<br><br>And free point!! ​
    15·2 answers
  • Is electricity a force or energy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!