1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
3 years ago
14

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses a

re difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. True or false?
Computers and Technology
1 answer:
Sonja [21]3 years ago
8 0

Answer:

False

Explanation:

Using subnet mask will be helpful, what the subnet mask does is moving the IP address boundary bettween the part that represents a network and the part that represents a host, thus, instructing the operating system which IP addresses are on the local subnet. Then the operating will communicate directly with the other host without using the router. Once this is achieved, memorizing the IP addresses is needless.          

You might be interested in
Calling all technology geeks— whenever I try to take a video; the video becomes muted and the sound button looks like this. Does
Diano4ka-milaya [45]

Answer: Just press on it or sum ig.

Explanation:

3 0
3 years ago
What is the nearest inhabited area to the amazon rainforest
TEA [102]
There are inhabited areas INSIDE the Amazon Rainforest. Many primitive tribes with little to no contact of the outside world live in remote areas of the rainforest, but the closest major city to the rainforest (also inside) is Manaus, Brazil.
4 0
3 years ago
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
almond37 [142]
<span>a spreadsheet and a printer</span>
7 0
3 years ago
Read 2 more answers
How have advances in computer technology changed the planning process?
Nady [450]

I am assuming you are talking about programming

I hope this helps

OPEN THE ATTACHMENT

6 0
3 years ago
Other questions:
  • Describe the function of the user account section of the control panel
    13·1 answer
  • All of the following are parts of the word processing window except _____. \
    9·1 answer
  • Debugging is not testing, but always occurs as a consequence of testing. <br> A) TRUE<br> B) FALSE
    13·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • Convert binary number 11101111.10111 to decimal
    5·1 answer
  • Ex1. Classify the following statements as business (B), functional (F), non- functional (N), or data (D) requirements; for the l
    13·1 answer
  • What is the purpose of saving code snippets?
    7·1 answer
  • Divide the difference of 47 and 23 by the difference of 25 &amp;13​
    11·1 answer
  • Which Save As element allows a user to save a presentation on a computer?
    11·1 answer
  • Future Cell Tech, a company that produces cell phones, is always on top of the newest technology and is the leader in cell phone
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!