1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
7

Hey can someone read My I.P address? My teacher want's us to learn port forwarding but I can't find my I.P. because its a school

computer
Computers and Technology
1 answer:
Alborosie3 years ago
7 0
Obviously you have access to any sort of device. 
click on your internet and click more info: 
your IP address will be stated clearly, for example as 666<span>.666.6.666</span>
You might be interested in
What is the difference between referential and entity integrity
Lisa [10]

Answer:

Explanation:

Referential integrity is the state in which all values of all foreign keys are valid. Referential integrity is based on entity integrity . Entity integrity requires that each entity have a unique key.

Hope this helped and have a good day

3 0
2 years ago
How many atoms of oxygen in 4 molecules of HN03​
Ganezh [65]

Answer:12 oxygen atoms are in 4 molecules of HNO3

Explanation: the amounts of atoms of all the component in HNO3, which are 1 atom of Hydrogen, 1 atom of Nitrogen and 3 atoms of Oxygen.

5 0
2 years ago
A wireless engineere has an access point using 5.725-ghz channel in the united states. In which band is the AP operating?
Trava [24]

Answer:

Option D: UNII-3

Explanation:

According to the 802.11 standard, 23 20MHz wide channels are defined in 5 GHz specturm. Each channel is 20MHz apart and they are separated into three Unlicensed National Information Infrastructure (UNII) bands. 802.11a/n/ac wireless devices can operate within these bands. In United States, UNII-3 is the upper UNII band that spans from 5.725 GHz TO 5.825 GHz and therefore it is the band that access point is operating. UNII-3 is not used in Europe countries for wireless communication.

6 0
3 years ago
The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
iogann1982 [59]

Answer:

A. Risk assessment estimate factors.

5 0
3 years ago
Which engineer may design a GPS for a vehicle?
Crank

Explanation:

Mechanical engineer may design a gps for a vehicle.

4 0
2 years ago
Other questions:
  • Fred wants to analyze his spending habits of the past few years and has gathered information on the checks he has written from 2
    6·1 answer
  • Post as a reply your example of "data, which is processed into information" case - examples should not necessarily be related to
    13·1 answer
  • What do level meters show?
    8·1 answer
  • If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
    10·1 answer
  • Write a program that will read two floating point numbers (the first read into a variable called first and the second read into
    13·1 answer
  • Which of the following statements are true regarding models? Select 3 options.
    11·1 answer
  • _____moves the head to proper track
    13·2 answers
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
  • Here is something cool
    5·2 answers
  • Transitive spread refers to the effect of the original things transmitted to the associate things through the material, energy o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!