1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
12

What's an ip address and what does it do?

Computers and Technology
1 answer:
Hoochie [10]3 years ago
7 0

Answer:

Explanation:

IP address is Internet Protocol address, which is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

An IP address do 2 functions:

1. Host or network interface identification

2. Location addressing

You might be interested in
“If the information ______________________, then that information (should / should not) be stored because _____________. For exa
lisov135 [29]

The blanks spaces are filled with the following;

  1. Is confidential, should not
  2. There's risk of information theft on the cloud
  3. Social security number, should not

<h3>Confidential information and the storage cloud</h3>

According to McGinley, in some cases, storing any type of personal information for one's self or one's customers in the cloud would be a mistake. Information relating to date of birth, Social Security number, passport numbers should not be kept in the cloud.

This follows from the fact that "Cloud providers are no less bulletproof than any of the other previous industry."

Read more on information storage;

brainly.com/question/24688176

5 0
3 years ago
C++ <br> see attached file for quesion
sveticcg [70]
The picture doesn’t load.
7 0
3 years ago
What is the difference between a database schema and a database state?
Alexxx [7]

Answer:

A database schema or an intention gives a description of the database. This can be considered as a blueprint of a database, and gives a list of fields in the database with their data types. ... A database state provides the present state of the database and its data.

8 0
3 years ago
Complete the method, isPerfectSquare(). The method takes in a positive integer, n. It returns a boolean that is true if n is a p
ratelena [41]

Answer:

  1. public class Square {
  2.    public static boolean isPerfectSquare(int n){
  3.        int sqrt_n = (int) Math.sqrt(n);
  4.        if(sqrt_n * sqrt_n == n ){
  5.            return true;
  6.        }else{
  7.            return false;
  8.        }
  9.    }
  10. }

Explanation:

Firstly, use sqrt method from Math package to calculate the square root of input n (Line 3). Cast the result to integer and assign it to sqrt_n variable.

Next, square the sqrt_n and check if it is equal to input n (Line 4). If so, return true, if not, return false (Line 4-8).

7 0
3 years ago
Why is an outfitting a workspace with video games in a technology development company considered a strategic use of money
Ne4ueva [31]

It is considered a strategic use of money as it  attracts talented computer programmers out there

7 0
4 years ago
Read 2 more answers
Other questions:
  • In pseudocode you can use the _________ library function to determine whether a character is an alphabetic letter.
    12·1 answer
  • Inside which command group will a user find the ability to configure Outlook rules used to organize a mailbox?
    10·1 answer
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • Multiple Choice
    5·1 answer
  • What made it possible to develop personal computers?
    10·2 answers
  • Which entity might hire a Computer Systems Analyst to help it catch criminals?
    12·2 answers
  • Iaz005<br> plz make a new zoom
    8·2 answers
  • Of the following potential benefits, which is LEAST likely to be provided by the upgraded system?
    12·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
  • What type of security solution provides a hardware platform for the storage and management of encryption keys?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!