1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
9

. Hackers generally disguise their IP address. True False

Computers and Technology
1 answer:
maw [93]3 years ago
4 0
I think that's true.
If they didn't they could be easily tracked by the police.
You might be interested in
Does the game cooking fever use data?
arlik [135]
It will if your not connected to wifi
5 0
3 years ago
Mrs Jones had p hens then she decided to buy p more hens. how many hens does she have in all?​
Mars2501 [29]

Answer:

2p

Explanation:

if she had p, then she got p again, she got two p amounts. p+p = p*2 = 2p

6 0
3 years ago
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
nata0808 [166]

A student is curious about how a Web site appears on his computer screen. There is a communication between the client and the server in the Application Layer.

Explanation:

  • When we choose to open a webpage (in any browser) the seventh layer of the OSI model - called Application layer will help to do that.
  • What happens after we write the webpage address in address bar is that the Application layer protocol (also called HTTP) formats and sends the request from the client's browser (Internet Explorer, Mozilla Firefox , Opera, Safari etc.) to the server.
  • It also formats and sends the server's respond back to client's browser. This process happens very fast and all the OSI model layers are processing in it (not only the Application layer).
  • All the layers are working together and each of them is responsible for some particular job, but all together they work as one. The layers communicate with each other and in case of error they will retry and fix the error or if they are unable to do it, the responsible layer will inform the user about the source of the problem.
  • What happens when page is requested and received? If we will remove the graphical and visual image and look at the process that computer does. We will see a set of commands, mathematical algorithms, symbols, letters and not understandable codes and processes.
  • When data is sent from "A" to "B", a transport layer is responsible to send and deliver it correctly and exactly the same, what was requested.
  • If the request, processed by "A" (sender) is too long, the transport layer will divide it in segments (called segmentation process) to understand well and not make a mistake while sending the data to "B" (recipient). After this process data is travelling through the network to the "B" (recipient), if the sent data is segmented or divided, the transport layer is responsible for reassemble it again and "B" (recipient) receives its requested data (It can be web page or other data).
  • If the transport layer will not do the segmentation process, then the next - network layer - will check the data and if the requested message is too long it will fragment it (called fragmentation process) and will provide the same as transport layer had to do.
  • All the layers processes are connected to each other and work cooperatively.
5 0
3 years ago
________ is a command-line utility installed in the windows\system32 folder that displays information about your windows version
Ne4ueva [31]
Im pretty sure its SystemInfo...... 
6 0
3 years ago
Which of the following factors put you at risk for injury?
Monica [59]

Answer:

Prolonged exposure to vibration

Long periods of localized pressure

Explanation:

Repetitive motion is certainly not harmful, but prolonged repetitive motion can be a cause for injury. This is because if you are in repetitive motion for a long time, you exert a lot of force on your body, and that is certainly going to effect your body. And after a certain limit, even death can be a case. Hence, one should be very concerned about the time limit while their body goes through the repetitive motion.

However, neutral position we are always safe, as it’s an ideal position, as in this position, the work done is zero. Work done= force x displacement. And displacement in neutral position is zero. Hence, zero energy is lost. Hence, we are safe in this position.

Hence the above answer.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
    9·1 answer
  • Hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
    13·1 answer
  • Toshiba Corporation makes computer chips. Toshiba Corporation would be classified as a A. merchandising company. B. manufacturin
    15·1 answer
  • Short Answer: Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could
    8·1 answer
  • Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.
    14·1 answer
  • How are procedural and object-oriented programming approaches similar?
    14·1 answer
  • A company decides to relocate its operations to another state in order to take advantage of some new business investment credits
    15·1 answer
  • Multiple Intelligence Theory explains that...
    8·2 answers
  • What is the missing line?
    9·1 answer
  • Virtualization:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!