1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
3 years ago
9

What can you do with someone's ip address?

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
5 0
Basically, scan his open ports and trying to access them. Also, based on this IP address you will find his country.

There are some good examples:
https://whatismyipaddress.com/
https://www.ultratools.com/tools/ipWhoisLookupResult
You might be interested in
Write a method named rotateright that accepts an array of integers as a parameter and rotates the values in the array to the rig
trasher [3.6K]
You should really state what language you are using. I have produced your method in C#, and should be easily translatable in to any other language.

static void RotateRight<T>(T[] arr)
{          
    T temp = arr[arr.Length - 1];
   
    for (int i = arr.Length - 1; i >= 0; i--)
    {               
        if (i == 0)                   
            arr[i] = temp;               
        else                   
            arr[i] = arr[i - 1];           
    }       
}
3 0
3 years ago
Which number is the smallest? 4.4 ⋅ 10^-5, 3.99 ⋅ 10^-6, 2.6 ⋅ 10^3
tiny-mole [99]
3.99 • 10^3 is the smallest
8 0
3 years ago
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the
GarryVolchara [31]

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

3 0
3 years ago
Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store t
d1i1m1o1n [39]

Answer:

she can use Ctrl S then open it again

Explanation:

i hope this helps and please mark as brainliest

4 0
3 years ago
Write an if-else statement that determines whether the variable points is outside the range of 9 to 51. If points is outside the
Mrac [35]

Answer: Using Python

Explanation:

num = int(input("Enter number > "))

if num in range (9, 52):

   print("Valid Points")

else:

   print("Invalid Points ")

8 0
2 years ago
Other questions:
  • Icon view, list view, and details view are all common views provided by which kind of program?
    6·2 answers
  • Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typica
    9·1 answer
  • The first documented use of work release was in the ____.
    13·1 answer
  • Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on th
    12·1 answer
  • A business traveler notices there is an extra connector between the keyboard and the computer, in a business center. She has mos
    12·1 answer
  • What is the correct order of headers, from left to right, in a completed frame?
    8·1 answer
  • Why is it a best practice of a remote access policy definition to require employees and users to fill in a separate VPN remote a
    14·1 answer
  • Which of the following statements are true?
    11·1 answer
  • Match the elements of a web page with their descriptions.
    12·1 answer
  • A(n) ________ is a chart based on PivotTable data.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!