1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
5

When tcp/ip was developed, the host table concept was expanded into a hierarchical name system for matching computer names and n

umbers using this service:?
Computers and Technology
1 answer:
zmey [24]3 years ago
4 0
DNS, Domain Name Service, (a.o.) it translates computer names into ip addresses
You might be interested in
(9/5)C+32 write QBASIC expessions for this​
grigory [225]

Answer:

REM PROGRAM TO CONVERT TEMPERATURE IN CELCIUS TO FARENHEIT

CLS

INPUT “ENTER TEMPERATURE IN CELCIUS”; C

F = C * (9 / 5) + 32

PRINT “TEMPERATURE IN FARENHEIT=”; F

END

Explanation:

Your formula suggests a celcius to fahrenheit conversion...

8 0
3 years ago
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
ycow [4]

Answer:

A

Explanation:

4 0
3 years ago
Need help with java project please!!
Irina18 [472]
 can do c++ and javascript but I might be able to help
send me a message
7 0
3 years ago
Read 2 more answers
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
Ray Of Light [21]

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

3 0
3 years ago
Which line of code will use the overloaded multiplication operation?
maks197457 [2]

Answer:

def __mul__(self, b):

Explanation:

correct edge 2021

4 0
2 years ago
Other questions:
  • Suppose you have two arrays of ints, arr1 and arr2, each containing ints that are sorted in ascending order. Write a static meth
    7·1 answer
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • What is the impedance mismatch problem? Which of the three programming
    10·1 answer
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • Hey I don’t have a question I’m just testing something on this app
    6·2 answers
  • Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o
    11·1 answer
  • What two pieces of information would you need in order to measure the masses of stars in an eclipsing binary system?
    9·1 answer
  • Select what's true about Search Engine Companies. Check All That Apply The information contained in a search engine database is
    12·1 answer
  • Convert the following hexadecimal numbers to decimal numbers. (Show your work) a. 0xE3 b. 0x4A c. 0xF9
    10·1 answer
  • Which tool can be used to increase the space between a bullet point or a number and text?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!