1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
15

Describe how a computer with a Private IP address accesses the Internet. HTML Editor Keyboard Shortcuts 12pt Paragraph 0 words Q

uiz saved at 10:53am Questions Answered Question 1 AnsweredQuestion 2 Answered Question 3 Answered Question 4 AnsweredQuestion 5 AnsweredQuestion 6 AnsweredQuestion 7 AnsweredQuestion 8 AnsweredQuestion 9 AnsweredQuestion 10 AnsweredQuestion 11 AnsweredQuestion 12 AnsweredQuestion 13 AnsweredQuestion 14 AnsweredQuestion 15 AnsweredQuestion 16 AnsweredQuestion 17 Haven't Answered YetQuestion 18 AnsweredQuestion 19 Haven't Answered YetQuestion 20 You marked this question to come back to later AnsweredQuestion 21 AnsweredQuestion 22 AnsweredQuestion 23 AnsweredQuestion 24 Haven't Answered YetQuestion 25 You marked this question to come back to later AnsweredQuestion 26 AnsweredQuestion 27 AnsweredQuestion 28 AnsweredQuestion 29 AnsweredQuestion 30 Time Running: Hide 13 Minutes, 50 Seconds
Computers and Technology
1 answer:
Nonamiya [84]3 years ago
6 0

MARK ME BRAINLIEST PLEASE!!!!!!!

The IP addresses available to the internet are called public IP addresses. ... A computer using a private IP address on a private network can still access thhe Internet if a router or other device that stands between the network and the Internet is using NAT Network Address Translation.

You might be interested in
Brenda wants to finish her presentation with a summary slide . She wants three key messages to appear on each of the photo clips
Sav [38]

Brenda can first include an image and then include text. Lastly she can just provide an enhanced effect to the text to appear one by one each photo clip.

4 0
3 years ago
Read 2 more answers
A digital designer might do computer animation or video games true or false
pav-90 [236]

your answer should be TRUE if i’m correct..

MARK ME BRAINLIEST PLEASE IF IM CORRECT

3 0
3 years ago
Read 2 more answers
I will give brainyest
Trava [24]

Answer:

Power down your Chromebook by doing a hard reset.

Explanation:

The first thing to check for when your Chromebook won't turn on is a dead battery. Plug the unit in via AC charger and let it charge for at least 30 min to an hour and try turning it on again.

3 0
2 years ago
Read 2 more answers
Researching the history of computers is a good troubleshooting technique.<br> True or False?
Verdich [7]

Yes very much so! You could learn previous mistakes/bugs/etc and find solutions to fixing them and avoiding getting them. As well as much more. History is always a fun subject for anything, really in my opinion.

4 0
3 years ago
"what windows process is responsible for authenticating users?"
Likurg_2 [28]
Lsass.exe /................................................
8 0
3 years ago
Other questions:
  • You should hand write your references on your resume.
    15·2 answers
  • for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar
    9·2 answers
  • Write a Python program to do the following:
    12·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the remove method?
    6·1 answer
  • What type of account provides the same functions as managed service accounts but can be managed across multiple servers as in a
    8·1 answer
  • Which of the following refers to a collection of colors, fonts, and effects that can be
    6·1 answer
  • On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads
    9·1 answer
  • Autumn suffers from nocturnal dyspnea. This term describes a breathing condition but using the prefixes to translate, it means:
    5·1 answer
  • A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor
    14·1 answer
  • If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!