1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
11

If a computer is found to have an ip address of 169.254.1.1, what can you assume about how it received that ip address?

Computers and Technology
1 answer:
Tom [10]3 years ago
8 0
The 169.254.0.0/16 network is the self-assigned address network. The machine self-assigns when it can't reach a DHCP (Dynamic Host Configuration Protocol) server.
You might be interested in
Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
PIT_PIT [208]

Ill choose flowchart. Look picture for the answer

ask me if you have any doubts about my answer.

5 0
3 years ago
1) You are working with an organization as a network manager. The organization has
pantera1 [17]

Answer:

Explanation:

a. In this specific scenario, the best option would most likely be a site-to-site VPN. This would allow each office to be independently connected to the internet and at the same time be connected to each other securely and efficiently. There should be unnoticeable or no delay at all between the two offices and sensitive files will be completely secure. Therefore, the two offices can easily transfer data securely between one another without fear of the data being intercepted.

b.  The same VPN network would work on the head office, but instead we can implement firewall restrictions to the head office network itself. These restrictions would prevent any or all incoming connections that are trying to request data from the local head office network. This would allow the head office to continue working without worry of unwanted intruders in their network.

7 0
3 years ago
Question 8 of 25
denis23 [38]

Answer:

D to Protect sensitive data, Enterprise has certain security features and is mostly used in business settings.

5 0
2 years ago
"What is the concept of a computer implemented as part of a larger system that is typically designed around a limited set of spe
FrozenT [24]

Answer: Embedded system

Explanation:The combination of the hardware system along with software system to perform a particular function or task is known as the embedded system. It is a specific performance device which does its working on the basis of the microcontrollers as well as microprocessors .It performs the task according to the programs that are invoked in it to do the task in a larger device.

Example:- Printers performs specific task of printing and scanning

7 0
3 years ago
A web directory is a web page that conducts searches of the web to find the words or expressions that you enter? true or false.
Sav [38]
The answer to this is true! hope i helped!
4 0
3 years ago
Other questions:
  • At what point is an idea protected by copyright?
    7·2 answers
  • .The process of capturing the requirements includes all ofthe following with the exception of:
    10·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • ) A popular PivotChart that is used in Access is (Points : 4) column.
    9·1 answer
  • Desirable workplace habits and skills include:
    14·1 answer
  • Security breaches are easier to address with which payment form?
    11·2 answers
  • Ineeedd help please 35 points question
    5·1 answer
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!