1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
14

You have one ip address provided from your isp with a /30 mask. However, you have 300 users that need to access the internet. Wh

at technology will you use to implement a solution
Computers and Technology
1 answer:
creativ13 [48]3 years ago
4 0

Answer:

a. PAT

Explanation:

20.You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need toaccess the Internet. What technology will you use to implement a solution?a.PATb.VPNc.DNSd.VLANs

You might be interested in
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
garri49 [273]

Answer:

A or S most likely (I think)

7 0
3 years ago
How do you fix a computer
dolphi86 [110]

Answer: well it all depends on what is wrong with your computer

plz mark as brainliest

6 0
4 years ago
Wrtie a program in which we will pass a value N. N can be positive or negative. If N is positive then output all values from N d
Triss [41]

Answer:

Following are the answer to this question:

x=int(input("Enter number: "))#defining x variable that input value from user end

if x< 0:#defining if block that check x value is less then 0

   while x<0:#defining while loop print up to the value

       print(x)#print value

       x+= 1#add values by 1

elif x>0:#defining elif block to check value x is greater than 0

   while x>0:#defining while loop to print down to value

       print(x)#print value

       x-= 1#subtract value by 1

Output:

when input is a positive value

Enter number: 5

5

4

3

2

1

when input is a negative value

Enter number: -5

-5

-4

-3

-2

-1

Explanation:

  • In the given python code, x variable is declared that input the value from the user end, in the next step if and elseif block is declared that calculates and prints its value.
  • In the if block, it checks value is negative it uses the while loop to prints its values in the down to value form.
  • In the elif block, it checks the positive it uses the while loop to prints its values into the up to values form.  
5 0
4 years ago
The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the
Karolina [17]

Answer:

a) INFO2 file

Explanation:

When a file is deleted and moved to the Recycle Bin generates its own records inside a INFO2 file. These files save data from the deleted file, so it can be analyzed later. The size of a INFO2 file is 800 bytes usually.

The data saved into this files is:

  • Original location of the removed file
  • Date and time when deleted
  • Physical size of the deleted file
6 0
3 years ago
Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could a
Alexxx [7]

Answer:

False

Explanation:

Namedroppers help you look for domain names that are constantly updated on a daily basis. You can purchase a domain name of your choice from the results of the available domain names that are populated by namedropper. The description from the question above belongs to web application vulnerability scanners. These scanners are automated to scan web apps and look for vulnerabilities that most attackers take advantage of like SQL injection and buffer overflows.

8 0
4 years ago
Other questions:
  • - The concept of communication competence suggests there is no single "ideal" or "effective" way to communicate in every situati
    6·2 answers
  • In addition to MLA, what are some other widely used style guides? Check all that apply.
    5·1 answer
  • What limited the possibilities of game development from a technical viewpoint?
    7·1 answer
  • How many bits long is a autonomous system number?
    13·1 answer
  • Design by contract considers the software system to be a setof:
    10·1 answer
  • When a hoverboard's battery dies, does the hoverboard battery life get impacted the next time the battery is full?
    12·1 answer
  • HELP ASAP <br>please will mark brainliest<br>​
    5·2 answers
  • Why would students most likely need to collect data? Check all that apply.
    12·2 answers
  • c) If you are at foreign country visit, which banking card would you prefer to keep with you during visit (Debit Card or Credit
    10·1 answer
  • O
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!