1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
14

if you had two proxy servers located in the same room, what use could you make of them? nothing create a hub sell one of the ser

vers set up a network neutral zone
Computers and Technology
2 answers:
Anit [1.1K]3 years ago
6 0
Create a free wifi service
Kamila [148]3 years ago
3 0

Answer:

create a hub

Explanation:

You might be interested in
Renee just got on the freeway to go to her cousin's house in Denver. She is driving 50 miles per hour. Her sister Kim left one h
defon

let's say they catch-up to each other after t hour.

so

in t hour distance travelled by Renee

d = speed × time = 50t

in t hour distance travelled by Kim

d = speed × time = 60(t-1) + 0×1 = 60(t-1)

Note: here kim didn't covered any distance in first hour and in rest t-1 hour it travelled all distance

now.as distance travelled by both is same so

60(t-1) = 50t

60t -60 = 50t

adding 60 both sides

60t = 50t+60

subtracting 50t both sides

60t -50t = 50t+60 - 50t

10t = 60

dividing by 10 both sides

t = 60/10 = 6

so in 6 hour both will catch-up to each other

3 0
3 years ago
Alcohol is considered a _____ drug
andreyandreev [35.5K]
Bad.......................
8 0
3 years ago
Read 2 more answers
What do you think is the reason why there are two kinds of transmission mode in computer networking?
saul85 [17]

Answer:  Transmission mode or communication mode is referred to as transmission of data between two devices using a communication channel that includes an optical fiber, copper wires, wireless channels, and various storage media. The data that gets transmitted is in the form of electromagnetic waves. There are various ways of data transmission where the message that is passed is in the sequence of pulses using digital modulation. The transmission mode of data was first introduced in a computer networking system during the 1940s in modems, then in LANs, WANs, repeaters, and other networking system

is this what u are looking for?

7 0
2 years ago
________ involves the use of the internet to steal important information.
Ivenika [448]
Phishing involves the use of the Internet to steal important information.
Shoulder surfing refers to people spying on other people while they are using an ATM. Skimming a credit card refers to thieves using a device in ATMs to steal information from cards. Dumpster diving refers to picking trash from dumpsters.
5 0
3 years ago
Why does Phone Manufacturers make more than FHD Screen?
Ulleksa [173]
Phone screens are smaller, but are apparently more HD than a full, widescreen TV. Why? The pixels are small but they can fit in just that little screen space, but is harder to fit onto a relatively gigantic TV screen.
5 0
2 years ago
Other questions:
  • What is the value of the variable phones after the execution of the following code? phones = {'John': '5555555', 'Julie' : '7777
    6·1 answer
  • A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter's e-mail accou
    6·2 answers
  • In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the syste
    10·2 answers
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    8·1 answer
  • Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
    13·1 answer
  • write a function that takes two integer arrays as input return true if any two of the numbers in the first array input add up to
    10·1 answer
  • Can someone please give me timetable managment system with data structures in java?
    11·2 answers
  • A ___________ is a variable used to pass information to a method.
    11·2 answers
  • Choose three typical responses for the Host utility, and explain what they indicate.
    6·1 answer
  • Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!