1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
13

Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu

ters on that network access the Internet ?
Computers and Technology
1 answer:
Zinaida [17]3 years ago
7 0

Answer:

Public IP addresses are accessible and available on the internet, while the private IP addresses are not.

Explanation:

Public IP addresses are accessible and readily available on the internet, while the private IP addresses are not easily accessible and also not available on the internet; A router alternate the private IP address with its own public IP address. which gives room for the computer to acces the internet.

You might be interested in
What is Fill handle?
vesna_86 [32]

Answer: I copied and pasted my answer if you need the website to cite information let me know

Explanation:

Fill Handle is a feature in Excel that enables you to auto-complete a list in a row/column by simply dragging it using your mouse. A basic understanding of fill handle in Excel could save you some time and make you more productive.

6 0
3 years ago
What is the Difference between raw_input and input?
erik [133]
The difference between raw_input and input is

when you're using raw input,  it returns a string and input and tries to run the input as phyton expression

hope this helps
3 0
3 years ago
Finding your style in photography is about ___
marusya05 [52]
Only B and C would be the best choice
7 0
3 years ago
Read 2 more answers
Please help ASAP!!! :))
Talja [164]

Answer:

You can upgrade the OS by applying SECURITY patches to the server

Explanation:

I can't think of anything else it could be

3 0
3 years ago
What is the purpose of the backoff on Ethernet networks?
stellarik [79]

Answer: Please see below as the answer is self-explanatory.

Explanation:

In the original Ethernet standard, IEEE 802.3, the method used to deliver packets within a Ethernet network, is called CSMA/CD, and the acronym includes all the Ethernet features in brief.

Let's explain the different parts of the acronym.

CSMA= Carrier Sense Multiple Access.

This means that when any computer in the network (with no privileges for nobody) has a packet to transmit, it first "listen"if the network is idle. If it is the found condition, deliver the packet, and wait for an acknowledgement.

If past a given time, the ACK is not received, assumes that the packet was lost, due to a collision with another packet coming from another computer (this can happen because the packets don't travel instantaneously from one host to another, so one machine could have started to transmit before the another one could sense this fact).

This process is described by the other part of the acronym:

CD = Collission Detection

In order to avoid this type of problem, before trying to resend the packet, it waits some time, which is called "backoff".

This time increases exponentially each time that it is not possible to send a packet successfully, in order to try to find a moment in which finally the network be clear.

8 0
4 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of
    14·1 answer
  • The network layer, or osi layer 3, provides services to allow end devices to exchange data across the network. to accomplish thi
    15·1 answer
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • Which of these components is a part of the central processing unit (cpu) of a computer??
    14·1 answer
  • Which of the following information is most important to include in a timeline
    14·2 answers
  • A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p
    12·1 answer
  • What will you see on the next line?
    6·2 answers
  • NEED HELP ASAP!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!