A proxy server. A system requests information from the internet, and that traffic is routed through the proxy server before arriving to the requesting system.
This is why proxy servers are used for hiding identity and being more secure, as internet traffic would show the IP address of the proxy server, and not the requesting system, though this often depends on the type of proxy server, as some proxy server's main objective isn't anonymousity, but rather efficiency.
Answer:
total = 0
for i in range(4):
bill = float(input("Enter bill for quarter " + str(i+1) + ": "))
total += bill
average = total / (4 * 3)
if average > 75:
print("Average monthly bill is $" + str(average) + ". Too much water is being used")
if 25 <= average < 75:
print("Average monthly bill is $" + str(average) + ". A typical amount of water is being used")
if average < 25:
print("Average monthly bill is $" + str(average) + ". Thank you for conserving water")
Explanation:
*The code is in Python.
Create a for loop that asks the user to enter the bill for 4 quarters and calculate the total of the bills
Calculate the average monthly bill, divide the total by 12
Check the average for the given conditions. Depending on its value print the required message along with the average monthly bill
Explanation:
A hub is used to send the message from one port to other ports.It does not know the specific address of the destination where the message needs to send.it works on Physical layer of the OSI model(layer 1).
A switch can handle data and it knows the specific address of the destination.A switch works on the data link Layer of the OSI model(layer 2).
Mmm what are u talking abouy
The answer is Tailoring the baseline to their needs.
After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.