1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
7

ABC incorporated wants to implement a TCP/IP network for its only site. It has 180 employees and two buildings and requires Inte

rnet access for an e-mail server, a single Web server, a single FTP server, and two routers, each with a single high speed Internet interface. If the company wants to hold ISP costs to an absulate minumum, what kind of IP addresses should they primarily use
Computers and Technology
1 answer:
riadik2000 [5.3K]3 years ago
5 0

Answer:

A private IP address should be implemented but a PAT and a static NAT should be configured for the computers and the intermediate devices respectively.

Explanation:

There are two types of IP addresses, they are public and private addresses. The public address is an IP4 address routable on the internet while the private address is not routable.

Internet service providers do charge for the use of public IP addresses they render, which can be very costly. To reduce the company's expenses on the internet, the company is networked with private addresses and are mapped for network address translation ( NAT) which assigns a public global address to devices accessing the internet.

You might be interested in
What makes smartphones so fragile?
In-s [12.5K]
Glass screen probably
7 0
3 years ago
Define types of hacker ? with three to four line of each types?​
Strike441 [17]
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
5 0
3 years ago
This sensor is used for burglar alarms<br>A. temperature<br>b. humidity<br>c. movement<br>d. PH​
bogdanovich [222]

Answer:

C

Explanation:

Have a great summer :)

8 0
3 years ago
In which of the following movies, multimedia's special effect is used ? *
Mila [183]

\qquad \qquad\huge \underline{\boxed{\sf Answer}}

The Correct choice is ~ D

In all these movies, multimedia's special effects are used

5 0
2 years ago
Read 2 more answers
Plz help im timed
Daniel [21]

Answer:

i believe C. Ethic

Explanation:

Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of correct and wrong behavior". The field of ethics, along with aesthetics, concerns matters of value, and thus comprises the branch of philosophy called axiology.

8 0
3 years ago
Other questions:
  • What's the best way to change the font size of all your notes pages at once?
    14·2 answers
  • William wants to create a document using a DTP. What time-saving techniques can he use?
    9·1 answer
  • What is a many-to many types of correspondence?
    5·1 answer
  • The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if
    12·1 answer
  • You are configuring the local windows firewall on your windows 7 computer. which network category needs to have the most stringe
    6·1 answer
  • A student who used a regression model that included indicator variables was upset when receiving only the following output on th
    10·1 answer
  • Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
    10·1 answer
  • Every modern nation has a Central Bank. Which of the following is the Central Bank for these United States?
    14·2 answers
  • Is the flow of power reversible in a leadscrew?
    11·1 answer
  • You will include code that will validate all user input. If the user inputs an invalid value, the program will respond with an e
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!