1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
3 years ago
7

You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby

to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000
Computers and Technology
1 answer:
Alika [10]3 years ago
8 0

Answer:

okay if I am it administration I will port 10000

You might be interested in
Each row in a database is a set of unique information called a(n)
blondinia [14]

A row, which is also called a tuple.

4 0
3 years ago
Read 2 more answers
6. What is the correct way to write 340,000,000 in scientific notation? (1 point
givi [52]

Answer:3.4X10^8

Explanation:

4 0
3 years ago
Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo
zavuch27 [327]

Answer:

D) extents

Explanation:

Disks fragmentations in computer science refers to the cases of a file system laying out its contents  in a non-continuous manner thus preventing an in-place alteration of the contents (that is the contents of the file are scattered in fragments across different location on the disk). Disk fragmentation is mostly associated with aging. To mitigate against this, modern implementation of file systems try to preallocate longer chunks of disk space, this is called extents, in this way fragmentation is avoided since a contiguous size of disk space is preallocated to the files and its contents stay together.

4 0
3 years ago
Which one of the following careers is the most highly resistant to economic change?
Eduardwww [97]

Answer:

Video game designers bbbbbbbbbbbbb

8 0
3 years ago
What is is plagiarism?
STALIN [3.7K]
Plagiarism is taking the work of others word by word and saying that it’s yours.
5 0
4 years ago
Read 2 more answers
Other questions:
  • What do you believe are the advantages of a clean install over an upgrade? What additional choices do you think are important to
    9·1 answer
  • If you need help with a topic that isn't present in English or math labs, what should you do?
    13·2 answers
  • Sadie helman runs a web site for amateur snowboarders. she likes to post videos and music related to snowboarding on her site as
    12·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • Match the spreadsheet functions to their operations.
    10·1 answer
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • 8. Cloud Storage is
    5·2 answers
  • 3 alternativas donde puedas utilizar la tecnologia que nos ayude a reducir el impacto ambiental al medio ambiente
    14·1 answer
  • Which of the four factors of production are hit the hardest when high unemployment occurs ?
    10·1 answer
  • A large retailer is asking each customer at checkout for their zip code. if the zip code is the only recorded variable, what is
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!