1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
2 years ago
9

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another

network?
1. Root server2. Default gateway3. DHCP server4. DNS server5. default gateway
Computers and Technology
2 answers:
mihalych1998 [28]2 years ago
4 0

Answer: the DNS server

Explanation:

vova2212 [387]2 years ago
3 0

Answer:

2. Default gateway

Explanation:

When there is a need for a device on one network to communicate with another device on another network, of course with a known IP address, the point of exit is through default gateway. The default gateway can be likened to the gate of a particular house A. To go from this house to another house B, you need to go through the gate.

Default gateway permits outbound connections from one network to another for the purpose of communicating.

Note that it is called "default" because unless otherwise specified, that is the point through which outbound connections to another network is possible.

You might be interested in
Is permanent software programmed into read-only memory.<br> Firmware<br> JavaScript<br> PHP<br> o
velikii [3]
Firmware is the software
5 0
2 years ago
True or False: It is illegal to park in a location that you block or create a hazard for other vehicles.
Feliz [49]
The answer to question is true
5 0
3 years ago
Read 2 more answers
Why is it important to send a cover letter with a resume?
Novay_Z [31]
It's important to do so because you want to be sure it looks professional, just like it's important to add a cover to a report. It's also the first look at the resume and gives the overall look of it. It lets the job or employer know the specifics and into the resume talk more of what you do. It's like the overall information page..... Hope this helps. 
5 0
3 years ago
Read 2 more answers
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
Other questions:
  • Which of the following statements is true with regards to satellite Internet access?
    13·2 answers
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • Which paragraph from the article helps explain what “engaged” is referring to?
    9·1 answer
  • True or false when a host gets an IP address from a DHCP server it is said to be configured manually
    15·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • Why the internet is not considered a mass medium in Africa​
    13·2 answers
  • Please help me on this please i am giving all of my points so please help me
    6·1 answer
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!