1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
4 years ago
15

Why are computers assigned IP addresses

Computers and Technology
1 answer:
user100 [1]4 years ago
8 0

Answer:

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

Explanation:

You might be interested in
Pie charts are best used for
Anna11 [10]

Answer:B

Explanation:Showing parts of a whole.

4 0
3 years ago
"En la opción
Katyanochek1 [597]
Answer: I think email

Explanation: not rlly sure tho..
5 0
3 years ago
Interest assessments are always accurate. True False
Brums [2.3K]

Answer:

False

Explanation:

3 0
3 years ago
Sal Kan earned $3,000.00, But he is only getting $1,585.00 on his pay check to
svetlana [45]

Answer:

Usually, it's because of taxes and insurance.

3 0
3 years ago
Which of the following occurs during data cleansing?
Diano4ka-milaya [45]

Answer:c)Clean redundant customer data

Explanation:Data cleansing/cleaning is the activity for the elimination of the data which is not required for further use, corrupt, unnecessary etc by detecting it. The data that is being cleared is categorized by levels like irrelevant  data, incorrect data, inaccurate data, redundant data etc.

The data is eliminated by the method of correcting , modifying, reducing unnecessary parts,deleting, etc.Thus, the correct option is option(C).

5 0
4 years ago
Other questions:
  • What kind of game was Pole Position?
    14·1 answer
  • _____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
    14·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • Molly, an end-user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
    5·2 answers
  • The "Rudolph Rule" is best described by which of the following?
    9·1 answer
  • Copy the countdown function from Section 5.8 of your textbook. def countdown(n): if n <= 0: print('Blastoff!') else: print(n)
    8·1 answer
  • Write a Scientific report modeling a written reasearch paper on big data applications.​
    6·1 answer
  • What happens to a message when it is deleted?
    5·2 answers
  • A Product Manager has been given responsibility for overseeing the development of a new software application that will be deploy
    5·1 answer
  • What color pixels are used in a camera?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!