1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
5

A server needs to connect directly to the Internet. The ipconfig/all command shows that the server has been auto-assigned the IP

v6 address fe80::260:8ff:fec0:98d%4. It won’t connect to the Internet because it is a _________ address, which does not have Internet access
Computers and Technology
1 answer:
Deffense [45]3 years ago
8 0

Answer:

Link-local address

Explanation:

IP addresses that have "FE80" as the hexadecimal representation of their first 10 bits are IPV6 reserved addresses for link-local unicast addressing. These addresses are automatically configured (though may be manually configured too) on any interface and should not be routed. They are used for addressing on a single link with the main aim, among others, of automatic configuration and routing protocol advertisement. Devices attached to this link can be accessed or reached using the link-local addresses as they don't need a global address to communicate.

However, routers will not forward datagram or packets using link-local addresses. In other words, routers are not allowed to connect to the internet using the unicast link-local addresses.

You might be interested in
Steps for Saving and opening a document.​
Leviafan [203]

Answer:

Click FILE > Save, pick or browse to a folder, type a name for your document in the File name box, and click Save. Save your work as you go - hit Ctrl+S often.

#SolutionGiven

3 0
3 years ago
The link for notepad is located by default in the _______ menu.
jolli1 [7]
B. Accessories. Notepad, like many other useful tools, is located within the accessories area.
5 0
3 years ago
When the program generates or populates reports after getting the data and processinng,it is called
TiliK225 [7]

Answer:

In computing, extract, transform, load (ETL) is the general procedure of copying data from one or more sources into a destination system which represents the data differently from the source(s) or in a different context than the source(s).

Data extraction involves extracting data from homogeneous or heterogeneous sources; data transformation processes data by data cleansing and transforming them into a proper storage format/structure for the purposes of querying and analysis; finally, data loading describes the insertion of data into the final target database such as an operational data store, a data mart, data lake or a data warehouse. Hope this helps! PLEASE GIVEE ME BRAINLIST!!! =)

6 0
3 years ago
Cual es la funcion del procesador resumen porfa
Arisa [49]

Answer:

todavia necesitas ayuda

7 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
arlik [135]

Smart devices is a technology trend, interest in renewable energy is a social trend, and buying solar panels and generators is a consumer trend.

4 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • Explain at least one reason why programming languages have functions
    12·1 answer
  • What letter names the drive where windows most commonly stores data and files
    13·1 answer
  • You are doing research for a science project on current trends in nanotechnology. You do a web search for information that inclu
    10·1 answer
  • discuss the advantages and disadvantages that Excel has in helping navigate databases, big data, and data analytics.
    11·1 answer
  • A​ _______ variable is a variable that has a single numerical​ value, determined by​ chance, for each outcome of a procedure.
    7·1 answer
  • Create a script that asks for the student's percentage point through a prompt box. Using the following scenarios write if else s
    5·1 answer
  • You are the IT security administrator for a small corporate network. You would like to use Group Policy to enforce settings for
    14·1 answer
  • Choose a different well-known company that you know of, and describe its direct and indirect competitors. Describe at least 2 di
    9·2 answers
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!