1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
4 years ago
11

How we can get NET I'D by IP Address?

Computers and Technology
1 answer:
Volgvan4 years ago
7 0
Actually NET ID or Network identifier and ip addresses are both linked to each other. There is no way to get an NET id without an IP address. You can get your NET id on ip calculating websites, by posting your IP address and letting them determine what NET id you have.
You might be interested in
Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two boo
Anastasy [175]

next time m8 mmmmmdsaasd

5 0
3 years ago
Free up disk space by doing____?​
8090 [49]

Answer:

Deleting files and etc on your computer.

6 0
3 years ago
Read 2 more answers
Software ________ defines the permissions, rights, and restrictions assigned to the person who purchases a copy of software.
Lesechka [4]
The answer to this question would be "Licensing"
3 0
3 years ago
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp
laiz [17]

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


3 0
3 years ago
Read 2 more answers
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
AURORKA [14]

Answer:

<em>B. Pirated software </em>

Explanation:

Software piracy is used <em>to define the act of using, duplicating or  transferring software unlawfully without property or legal rights.  </em>

Today, most software is bought as a single-user permit,  <em><u>which means that at one moment only one PC could have that software running on it. </u></em>

Trying to copy the software to various devices or distributing it without  multiple licenses is regarded to be illegal software piracy.

4 0
4 years ago
Other questions:
  • What are smart mobile devices?
    6·2 answers
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • Who created apple and in what year was it created
    9·2 answers
  • Which term describes the distance from one point on a wave to the same point on the next wave?
    13·2 answers
  • Is an applications program is a program designed to perform a specific task for specific users
    5·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • Explain set associative mapping<br>​
    10·1 answer
  • Please tell fast plzzzzzzzzzzz.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!