1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
15

While investigating the settings on your SOHO router, you find two IP addresses reported on the device’s routing table, which is

used to determine where to send incoming data. The two IP addresses
are 192.168.2.1 and 71.9.200.235. Which of these IP addresses would you see listed as the default gateway on the devices in your local network? How do you know?
Computers and Technology
1 answer:
Semenov [28]3 years ago
8 0

Answer:

Explanation:

Always the getaway is the first device in a network, and for that was assigned this IP address 192.168.2.1, is the first address of the block, a network getaway gives us interoperability between networks and contains devices, and is a protocol translator, this is a piece of hardware used for telecommunication networks.

You might be interested in
When companies want people to think their brand is wholesome, trustworthy, and confident, this is the color most often chosen.
notsponge [240]
A. Blue. When you want to be viewed as trustworthy and cool you would use the color blue.
6 0
3 years ago
Read 2 more answers
Which of the following statements about meta tags is TRUE?
Iteru [2.4K]

Answer:

I guess c no. is the answer

6 0
3 years ago
Read 2 more answers
One type of CAPTCHA is ________. a rootkit virus the wavy hard-to-read letter and number sequence that you type to prove that yo
sergejj [24]
<h2>password method</h2>

Explanation:

Rootkit virus is one type of virus which is hidden about its existence and tries to affect the maximum number of system.

Password method: This is a graphical method to identify the text hidden in the signature and confirming that it is not a robot or any other system to protect the system from hacking. This would be really hard-to-read and thus ensures safety.

Antivirus software: This is a system to protect the system, when the virus tries to attack the system. An indication will be given through the software to the user.

4 0
3 years ago
Imagine that you only used assignment statements for the design of the seven-segment display decoder. How would you obtain the B
Basile [38]

Answer:

Please see the attached file for the complete answer.

Explanation:

Download pdf
6 0
3 years ago
What are the products that are produced in cottage industry?​
Elenna [48]

Answer:

Baskets, Pots, Mats, Clothes

3 0
3 years ago
Other questions:
  • On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
    5·2 answers
  • A web page ____ can also create a style sheet that takes precedence over the internal style sheets of browsers.
    10·1 answer
  • The members of the IT department have spent two days debating the best approach to roll out the new software update. After allow
    15·1 answer
  • What should you rely on to determine when to change your oil? a. Oil color b. 6,000 miles since the last oil change c. Owners ma
    7·1 answer
  • Write down the steps that you will take to organize your files
    12·2 answers
  • Graphic characters used to identify items on an unordered list first line indent is called _______
    8·1 answer
  • Bob works at a cafe where he earns $11 an hr. which of the following graphs describes the amount of money that bob earns after x
    9·2 answers
  • Write a Java program that prints out a 4x4 square (like the one below)
    11·1 answer
  • The…..executed simple
    8·2 answers
  • 11. Explain different types of program control with suitable flow chart.<br> N
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!