1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
9

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another

network?
1. Root server2. Default gateway3. DHCP server4. DNS server5. default gateway
Computers and Technology
2 answers:
mihalych1998 [28]3 years ago
4 0

Answer: the DNS server

Explanation:

vova2212 [387]3 years ago
3 0

Answer:

2. Default gateway

Explanation:

When there is a need for a device on one network to communicate with another device on another network, of course with a known IP address, the point of exit is through default gateway. The default gateway can be likened to the gate of a particular house A. To go from this house to another house B, you need to go through the gate.

Default gateway permits outbound connections from one network to another for the purpose of communicating.

Note that it is called "default" because unless otherwise specified, that is the point through which outbound connections to another network is possible.

You might be interested in
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
Why was packet-switching an advancement over previous forms of networking?
Elina [12.6K]

The answer should be B tell me if I'm wrong.


8 0
3 years ago
Read 2 more answers
the two main forces acting on a computer that sits on a table are _________ and _________. a. weight; gravity b. weight; mass c.
EleoNora [17]
It is A.weight: gravity
8 0
4 years ago
Read 2 more answers
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
3 years ago
Assume that an array of Integers named a that contains exactly five elements has been declared and initialized. In addition, an
just olya [345]

Complete Question:

Assume that an array of Integers named a that contains exactly five elements has been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3.

Write a single statement that assigns a new value to the element of the array indexed by j. This new value should be equal to twice the value stored in the next element of the array (i.e. the element after the element indexed by j ). Do not modify any other elements of the array!

Answer:

a[j] = 2 * a[j+1];

Explanation:

Since the array is named a and its indexes are referenced by the variable j

it means the elements of the array will be a[j] for (j=0; j=1;j=2).

The first element in the array (j=0) will be a[0], second element will be a[1] and so on.

The statement a[j] = 2 * a[j+1]; assigns a new value to the element of the array indexed by j, the  value is equal to twice the value stored in the next element of the array (j+1).

4 0
3 years ago
Other questions:
  • Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE p
    8·1 answer
  • Computers are said to use binary data because all computer data is simply a series of Os and 1s.
    10·1 answer
  • The most effective way to perform data entry is to keep your hands on the keyboard and press to move to the text cell in the row
    10·1 answer
  • Which one of these students is having a positive impact?
    8·2 answers
  • When RadioButton objects are contained in a group box, the user can select only one of the radio buttons on the panel.
    12·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    12·2 answers
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    10·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • What is an aspect ratio?
    6·1 answer
  • Consider the following incomplete method. Method findNext is intended to return the index of the first occurrence of the value v
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!