1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
2 years ago
9

Which one of these are a valid IPv4 address? Check all that apply.

Computers and Technology
1 answer:
Illusion [34]2 years ago
6 0
The answer is C.54.45.43.54
You might be interested in
A company wants to build a new type of spaceship for transporting astronauts to the moon. What should the company do first?
Paraphin [41]

Answer:

Think of some ideas of how their gonna create the new spaceship

Explanation:

Because I'm Smort (typo intended)

4 0
3 years ago
Read 2 more answers
Biography of bill gates
Juliette [100K]

Answer:

Bill Gates is a technologist, business pioneer, and altruist. He experienced childhood in Seattle, Washington, with a stunning and steady family who empowered his enthusiasm for PCs at an early age. He dropped out of school to begin Microsoft with his beloved companion Paul Allen. He wedded Melinda French in 1994 and they have three kids. Today, Bill and Melinda Gates co-seat the beneficent establishment bearing their names and are cooperating to give their riches back to society.  

Bill experienced childhood in Seattle with his two sisters. His father, William H. Doors II, is a Seattle lawyer and one of the co-seats of the Bill and Melinda Gates Foundation. His late mother, Mary Gates, was a teacher, University of Washington official, and executive of United Way International.

Explanation:

This is just a short biography and not a full one.

5 0
3 years ago
Read 2 more answers
Which of the following occurs during data cleansing?
Diano4ka-milaya [45]

Answer:c)Clean redundant customer data

Explanation:Data cleansing/cleaning is the activity for the elimination of the data which is not required for further use, corrupt, unnecessary etc by detecting it. The data that is being cleared is categorized by levels like irrelevant  data, incorrect data, inaccurate data, redundant data etc.

The data is eliminated by the method of correcting , modifying, reducing unnecessary parts,deleting, etc.Thus, the correct option is option(C).

5 0
3 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
3 years ago
You are a network technician for a small network. Your ITAdmin workstation just stopped communicating with all other computers i
Lelu [443]

Answer:

Ping the other workstations from the IT Admin workstation to confirm that connection has been lost, check the status of the network interface card in the workstation with command ifconfig in the terminal, then reset the connection using ifdown and ifup commands. If the problem is not resolved, check the cable connection.

Explanation:

Ping is an ICMP echo message sent by a network host to another to check for connectivity. If they are connected, the other workstation responds with an ICMP response message.

The ifconfig in Linux systems displays the network adapters and their individual IP configurations. If there is no connection even after the network is reset, then the cable connectors could be the problem.

8 0
3 years ago
Other questions:
  • Explain how can you protect your computer from malware
    15·2 answers
  • Is backing up computer files done on the hard drive?
    5·1 answer
  • These tools give presenters more freedom to move about the room and interact with their audience.
    5·2 answers
  • Opinions are always based on facts. <br> a. True<br> b. False
    7·2 answers
  • Find two consecutive even integers such that twice the smaller is 16 more than the larger
    10·1 answer
  • Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
    10·1 answer
  • The symbol located to the left of a code number that identifies a code description that has been revised is _____.
    12·1 answer
  • Design a for loop that gets 6 integer numbers from a user, accumulates the total of them, then displays the accumulated total to
    9·1 answer
  • What is a man-in-the-middle attack​
    14·2 answers
  • Is there an air flow through the house? if so, does the air flow in the window and out the chimney, or in the chimney and out th
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!