1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
13

.When might you want to use static IP addressing?

Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
4 0

Answer:

You might use static ip addressing when your network will be small and you don´t have plans to create a bigger network from this.

Explanation:

When you use static ip addressing you have to configure the routes between hosts manually, is easy to define this rules manually when your network is small because you know all the addresses and the routes to configure. But if your network is bigger and you didn´t know all the host addresses will take a long time to configure this manually.

You might be interested in
Both IT and organizational strategies are static and can be harmed when people resist change because IS success depends on the s
anzhelika [568]
Think it’s true idk
8 0
3 years ago
Explain the tearms alink and vlink​
Aleks [24]

Answer:

The <u>alink (active link)</u> color appears while the mouse is clicking the link. The <u>vlink (visited link)</u> is the color of the link after the user has already visited it.

4 0
3 years ago
g Points The critical section cannot be executed by more than one process at a time. false true Save Answer Q3.28 Points The cod
Ira Lisetskai [31]

Answer: Hello your question lacks some details attached below is the missing detail

answer :

a) True , B) False  C) True  D) True

Explanation:

a) True ; The critical section cannot be executed by more than one process at a time

b) False : The code does not satisfy the progress condition, because while loops are same hence no progress

c ) True :  The code satisfies the bounded waiting condition, because of the waiting condition of the while loop

d) True : No matter how many times this program is run, it will always produce the same output, this is because of the while loop condition

7 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
The retention of encoded information over time refers to
Crank

It refers to Storage

7 0
2 years ago
Other questions:
  • Int, char, bool, and double are all valid data types in c , true or false
    15·1 answer
  • What is a project manager?
    6·2 answers
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • Marjorie is a 72-year-old woman who is having difficulties with cooking and bathing. Jorge provides Marjorie with tools and tech
    12·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • Convert 3BA.25 (base 14) to base 6 ? Show all arithmetic in decimal
    5·1 answer
  • 80billion +2 TRILLION . PLEASE AWNSER
    7·1 answer
  • What is one similarity between low-and high-level programming languages? (5 points)
    14·1 answer
  • An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
    13·1 answer
  • 1- Identify the face expressions is considered....
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!