1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
2 years ago
14

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses a

re difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. True or false?
Computers and Technology
1 answer:
Sonja [21]2 years ago
8 0

Answer:

False

Explanation:

Using subnet mask will be helpful, what the subnet mask does is moving the IP address boundary bettween the part that represents a network and the part that represents a host, thus, instructing the operating system which IP addresses are on the local subnet. Then the operating will communicate directly with the other host without using the router. Once this is achieved, memorizing the IP addresses is needless.          

You might be interested in
The problem identification document commits the final and complete problem specification to paper and guides the software develo
tatuchka [14]

Answer:

False.

Explanation:

The problem identification document contains the description  of the problems that are restricting the goals and objectives of the project from being achieved.

It does not guide in decision making of the software developers.It helps them to see where the problem is not in decision making.

Hence the answer to this question is False.

7 0
3 years ago
Explain the 3 types of control transfer structures in programming using flowchart symbols
Paul [167]

Answer:

Process Flowchart.

Data Flowchart.

Business Process Modeling Diagram.

5 0
2 years ago
A(n)_________ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its c
sertanlavr [38]

Answer:

LDAP Injection Attack

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being described in the question is called an LDAP Injection Attack. Like mentioned in the question LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Write a python program to calculate the average of two numbers​
Elan Coil [88]

Answer:

n1 = int(input("Please enter a number<:"))

n2= int(input("Please enter a number<:"))

sum = n1 + n2

print("The average of the two numbers is", sum / 2)

8 0
2 years ago
Which NIMS communication principle ensures that communications and information systems can be expanded to support any situation,
madam [21]

Answer: Portability

Explanation: National; approach to incident management(NIMS) principle named as portability is responsible for the supporting the system in any situation. It lets an individual to access the equipment that are familiar.

Portability helps in moving the flow of the communication and resources with easiness and information system can be extended till the requirement to support the incidental situation.

8 0
3 years ago
Other questions:
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    5·1 answer
  • What is looping in QBASIC​
    9·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
    8·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • How to simplify???? 2(-3x^2+6x+1)-2(4x^2-3x+1)<br><br>​
    7·1 answer
  • Why are computers complicated?
    15·1 answer
  • What did Adam and Eve look like?
    7·2 answers
  • Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
    11·1 answer
  • The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!