1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
9

Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa

tically. which type of server do you need for this?
Computers and Technology
1 answer:
Aleks [24]3 years ago
5 0
DHCP (Dynamic Host Configuration Protocol)
You might be interested in
Which two graphs best represent the motion of an object falling freely?
larisa [96]
The graph would have to be pointing completely down to be falling freely.
4 0
3 years ago
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
4 years ago
You can copy and paste ________ from excel to powerpoint
Tanya [424]

Answer: data

Explanation:

3 0
3 years ago
Read 2 more answers
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
What is the name of the app that works like a emp jammer from your iphone app
lions [1.4K]

To my knowledge there is not one if that did somehow occour, it would result in your phone also getting fried by the EMP and render the app useless before it effected anybody else's phone or other devices. hope this answered your question:)

4 0
3 years ago
Other questions:
  • You would like to set up an online meeting to communicate with colleagues on a group project. Which of these tools should you su
    9·1 answer
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
    5·2 answers
  • After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
    13·1 answer
  • What is one step taken when solving a computer software problem?
    6·2 answers
  • What are the elements of a good study environment? Check all that apply.
    9·2 answers
  • Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses
    11·1 answer
  • Witch icon allows you to see paragraph formatting feature
    6·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
  • What is Selection statement?​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!