1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
3 years ago
9

What can you do with someone's ip address?

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
5 0
Basically, scan his open ports and trying to access them. Also, based on this IP address you will find his country.

There are some good examples:
https://whatismyipaddress.com/
https://www.ultratools.com/tools/ipWhoisLookupResult
You might be interested in
What happens if you give false information on your driver license application?
Artist 52 [7]

Answer:

<em>Cancelled</em>

Explanation:

Providing false information on your driver license application will result in your license being cancelled.

Giving the DMV any false info is considered a crime.

Hope this helped!

6 0
3 years ago
Which of the following is true of the 529 plan
sesenic [268]

A 529 Plan is an education savings plan operated by a state or educational institution designed to help families set aside funds for future college costs.

your answer will be: It is a tax-advantaged college savings plan.

5 0
3 years ago
Read 2 more answers
What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon
Paladinen [302]

Answer:

The correct answer to the following question will be "The capacity to work without reference to the data that would be contained in each bundle".

Explanation:

  • The Layer network governs the activity of the subnet. The main objective of this layer would be to transport data over multiple links from source to destination. When two computers are linked to the same cable, see no need for the network layer.
  • The role of this layer protocols defines the configuration and handling of packets used to transfer information from one to another host.
  • The main purpose of this layer is to allow multiple channels to be intertwined. This is achieved by sending packets to network adapters that depend on algorithms to identify the best directions for the information to move. Such routes are referred to as computer circuits.

Therefore, it would be the right answer.

6 0
3 years ago
_________________ uses soap or detergent to physically remove germs, dirt, and impurities from surfaces or objects.
ra1l [238]

Answer:

humans,washing mashines,dish washers

Explanation:

8 0
2 years ago
​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
Elena L [17]

Answer:

D.  ReFS

Explanation:

File system is simply a management system for files that controls how and where data are stored, where they can be located and how data can be accessed. It deals with data storage and retrieval.

Examples of file system are NTFS, FAT(e.g FAT 16 and FAT 32), ReFS.

ReFS, which stands for Resilient File System, is designed primarily to enhance scalability by allowing for the storage of extremely large amounts of data and efficiently manage the availability of the data. It is called "resilient" because it ensures the integrity of data by offering resilience to data corruption. It does not support transaction, encryption, file based compression, page file and disk quotas, to mention a few.

6 0
3 years ago
Other questions:
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • What is an unique text-based internet address corresponding to a computer's unique numeric IP address called
    8·1 answer
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi
    15·1 answer
  • Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
    14·1 answer
  • ECG mashine is an example of
    12·1 answer
  • Which field of study would be most useful for a person who wants to work in a recycling plant?
    12·2 answers
  • A browser is used for creating Web pages. true or false?
    5·2 answers
  • 60 POINTS IF YOU GET IT RIGHT
    6·2 answers
  • H e l p ASAP plz <br> and thanks
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!