1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
11

If a computer is found to have an ip address of 169.254.1.1, what can you assume about how it received that ip address?

Computers and Technology
1 answer:
Tom [10]3 years ago
8 0
The 169.254.0.0/16 network is the self-assigned address network. The machine self-assigns when it can't reach a DHCP (Dynamic Host Configuration Protocol) server.
You might be interested in
If you receive an increase in pay, how will that affect your payroll deductions?
spin [16.1K]
No it will actually help it
3 0
3 years ago
Which shot is not the best for a widescreen image
sasho [114]
Closeup? I think I’m pretty sure but I don’t really know though
7 0
3 years ago
Read 2 more answers
If I want to add a new slide to my presentation, which option would I click on?
ivanzaharov [21]
The answer would be D. New Slide
3 0
2 years ago
Array elements must be ________ before a binary search can be performed.
Sladkaya [172]
In order.
You have to be able to see if its on the left or right side of the midpoint
7 0
3 years ago
Words have both denotative and connotative meaning. The connotative meaning is Question 2 options:
Natalka [10]

Answer:

Option b is correct answer.

Explanation:

The connotative meaning is a word's implied or secondary meaning, in addition to its literal meaning.

Connotative meaning gives an idea or a feel that invokes for a person other than literal context of the word.

Connotation tells us weather the word used is in positive context or the negative one. For example, the words childish and youthful have same denotations but connotative meaning of childish is negative while youthful lies in positive context.

i hope it will help you.

4 0
2 years ago
Other questions:
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • What is f(-3) for the function f(a)=-2a2-5a+4?​
    10·1 answer
  • Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
    11·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • Light is a key formal element that film artists and technicians carefully manipulate to create mood, reveal character, and conve
    15·1 answer
  • Me inculparon de crear una cuenta en Facebook y colocaron el barrio donde vivo, ¿cómo podría demostrar lo contrario? Ayuda urgen
    6·1 answer
  • You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
    9·1 answer
  • List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13
    7·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
  • a data analyst is working with a spreadsheet that has very long text strings. rather than counting the characters themselves to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!