1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
7

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s

chool (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why
This is a loopback address.
This is a link-local address.
This is a private IP address.
There is an IP address conflict.
Computers and Technology
1 answer:
Montano1993 [528]3 years ago
4 0

Answer: This is private IP address

Explanation:

192.168.25.10 is a private IP address and is reserved for use only within an organisation so it cannot be used to communicate with the outside world. So in order to have videoconferencing they have to share their public IP addresses.

You might be interested in
Which of the following is an example of a sales promotion?
Alex777 [14]

Answer:

bird power bird power bird power

Explanation:

cause ik

4 0
3 years ago
______ norms are usually unstated rules that regulate members' interaction.
andrey2020 [161]
Hey there! Hello!

The answer to this problem is most likely group norms. The definition given above pretty much explains it: they're an unspoken/unwritten set of informal rules that dictate a group member's actions.
 
They allow for people to know how to act in social situations while also knowing who is acting out of place according to the group norms. It's a bit difficult to understand exactly what they are, since they are unstated and all. 

Hope this helped you out! Feel free to ask me any additional questions if you have any. 

–Lamb :-)
4 0
3 years ago
Niall is revising a history assignment using a word processor on a Windows computer. He wants to copy a section from an earlier
Zarrin [17]

Answer:Ctrl + V

Explanation:

7 0
2 years ago
When your phone sends/receives text messages (specifically using SMS), the total data sent/received contains more than just your
Alexandra [31]

An SMS is a short code that is used by businesses to opt in consumers to their SMS programs, and then used to send text message coupons, offers, promotions to those customers that had previously opted.

Explanation:

When Someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ringtone. The tower gives your phone a pair of voice channel frequencies to use for the call.

The MMS and other data driven services works on the fundamental voice network and is based on the big three GSM, CDMA and TDMA network technologies. The SMS allows text messages of 160 characters (letters, numbers and symbols).

The text messaging is an act of composing and sending electronic messages consist of alphabetic and numeric character between two or more more mobile devices.

7 0
4 years ago
Read 2 more answers
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Other questions:
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • What is cyber stalking and how does it work?
    7·2 answers
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • Which of the following types of memory extends the actual physical memory of a computer by copying blocks of data from the memor
    11·1 answer
  • Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form
    9·1 answer
  • What are two reasons for converting a document or record into a digitized format?
    6·1 answer
  • Three Strings someone help
    15·1 answer
  • Consider the following code:
    13·1 answer
  • True or False: Variablename must start with a number.
    13·1 answer
  • You need to select the text / picture /shape before you can Hyperlink.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!