1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
1 year ago
12

you want to implement a protocol on your network that allows computers to find the ip address of a host from a logical name. whi

ch protocol should you implement?
Computers and Technology
1 answer:
aniked [119]1 year ago
7 0

The protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

<h3>What is IP address?</h3>

It should be noted that IP address simply means a unique address that defines a device on the internet.

In this case, the protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

You might be interested in
Dustin is editing a SmartArt graphic. He wants all three shapes to be different colors.
lilavasa [31]

Answer:

click on Design tab → select associated shape → adjust color

Explanation:

I think it is that but i'm not positive. I will know in a little bit since I am taking the test right now.

6 0
3 years ago
11)When, if ever, will the geometric average return exceed the arithmetic average return for a given set of returns?A) When the
grigory [225]

Answer: E. Never

geometric average return can NEVER exceed the arithmetic average return for a given set of returns

Explanation:

The arithmetic average return is always higher than the other average return measure called the geometric average return. The arithmetic return ignores the compounding effect and order of returns and it is misleading when the investment returns are volatile.

Arithmetic returns are the everyday calculation of the average. You take the series of returns (in this case, annual figures), add them up, and then divide the total by the number of returns in the series. Geometric returns (also called compound returns) involve slightly more complicated maths.

6 0
2 years ago
On the line below, write the two places you can control tab settings.
nikklg [1K]

The two places you can control tab settings are the  ruler and in the dialog box.

<h3>What are setting tabs?</h3>

The Ctrl + Tab is one that is often referred to as Control Tab and C-tab or the Ctrl+Tab.

It is known to be a keyboard shortcut that is said to be most often used to chose between open tabs in a browser.

Note that the settings Tabs are said to be a kind of paragraph-formatting tool that is often used to align text.

Hence, The two places you can control tab settings are the  ruler and in the dialog box.

Learn more about control tab settings from

brainly.com/question/11509892

#SPJ1

See full question below

Where can’t you control tab settings? Check all the apply

On a ruler

In a dialog box

In the mini toolbar

In the paste special options

4 0
1 year ago
Alguien que me pueda ayudar diciéndome las características de Visual Object en programacion porfavor?!
Verizon [17]

Answer:

vvbdndndndndndnznmzxbbsvs

kgkgcicgfhjgyofdhkdyfjfgeghehehehehsbbsbsb

PLS HELP ??? LOL INEED HELP ITS TOO HARD

5 0
3 years ago
Which type of partitioning is performed onRelation-X?
goldenfox [79]

Answer: B) Vertical Partitioning

Explanation:

As, vertical partitioning is performed on Relation X, it is used for dividing the relation X vertically in columns and it involves creation of tables and columns. They also use some additional tables to store left out columns. We cannot partition the column without perform any modification of value of the column. It only relies on keeping the particular attributes of relation X.

7 0
2 years ago
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integer
    14·2 answers
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Please help me I need a help
    13·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • Help me please. I'LL MARK BRAINIEST
    15·1 answer
  • Sự ra đời của thương mại điện tử có tác động như thế nào đến việc quảng cáo và Marketing sản phẩm
    11·2 answers
  • What is one disadvantage people face without a checking account?
    12·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!