1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
7

Where did these networks get the name p2p

Computers and Technology
1 answer:
otez555 [7]3 years ago
8 0
From the creator of the network
You might be interested in
Please help i will give you brainiest and 5 stars answer the question!!!!!!!!!!!!!!!!!!!!!!!!!
QveST [7]

Answer:

He forgot to give credit to the sources at the end.

If you take something from a different source and you quote it, you must give credit at the end or it can go down as plagiarism.

5 0
3 years ago
You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address
oksian1 [2.3K]

Answer:

Answer C

Explanation:

Static NAT creates a fixed translation of private addresses to public addresses. The main difference between dynamic NAT and static NAT is that static NAT allows a remote host to initiate a connection to a translated host if an access list exists that allows it, while dynamic NAT does not.

5 0
3 years ago
3. Encode these sentences in ASCII: a. "Stop!" Cheryl shouted. b. Does 2 + 3 = 5?​
Zepler [3.9K]

Answer:

"Stop!" Cheryl shouted.
34, 83, 116, 111, 112, 33, 34, 32, 67, 104, 101, 114, 121, 108, 32, 115, 104, 111, 117, 116, 101, 100, 46

Does 2 + 3 = 5?
68, 111, 101, 115, 32, 50, 32, 43, 32, 51, 32, 61, 32, 53, 63

I got these numbers with this python code:
print([ord(c) for c in '"Stop!" Cheryl shouted.'])
print([ord(c) for c in 'Does 2 + 3 = 5?'])

4 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Algonac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their re
Masteriza [31]

Answer:

ADD ME ON TIK TOK @ madison.beautiful.dancer

Explanation:

3 0
3 years ago
Other questions:
  • What is requirement analysis
    8·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • On what basis can you categorize the generations of computers?
    11·1 answer
  • The __ contains the computers “brain,” the central processing unit (cpu)
    9·1 answer
  • Which domain ending can only be used by the U.S. government?
    14·2 answers
  • Describe a game that you have played (video game or other type of game) that had a good balance between being easy to learn the
    6·1 answer
  • Write a Python program that accepts a numeric value from the user and prints the number starting from 0 up to the user’s value.
    8·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
    11·1 answer
  • What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
    5·2 answers
  • What is the first step of viewing a web page as described in the video?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!