1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
3 years ago
15

What happens when two computers use the same IP address?

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
7 0

Answer:

Its B, "irregular signals sent over the network"

Explanation:

When you duplicate IP addresses don’t make one machine controllable but they rather just <em><u>break</u></em><u><em> network connectivity.</em></u>

<u><em /></u>

<u><em>HOPPPPE THIS HELPPPPPPPPPPPPSS</em></u>

You might be interested in
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demil
ella [17]

Answer:

i. True

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.

PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.

Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.

In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).

A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.

7 0
3 years ago
Which of the following electronic collaboration techniques is the best
muminat

Answer:

D. project management software

6 0
3 years ago
Read 2 more answers
An anchor tag can be coded using which two attributes?
IceJOKER [234]

Answer:

21212122121221212211212121212212121Explanation:

4 0
2 years ago
How would you define the rule of thirds?
mixer [17]

A pronciple of composition used fir centuries by artists and photographers or it is a method when used to frame a composition properly

8 0
3 years ago
Hello, this is for my compute science class, and I don’t know the answer, please help? Thank you in advance =)
Olin [163]

Answer:bd

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Pix blocks półfinały skilled
    7·1 answer
  • Can you help me correct a sentence?
    13·1 answer
  • While designing web pages for mobiles, the page content should be extensive such that the readers get the opportunity to explore
    5·2 answers
  • ________ are used in input, processing, and output operations that can help create more efficient programs as the data can be pr
    11·1 answer
  • Works in the public domain have copyright that are expired or abandoned true or false
    5·1 answer
  • When preparing a document flowchart, the names of organizational departments or job functions should appear in theA) column head
    6·1 answer
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • _____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it
    10·1 answer
  • What is web browser <br>​
    7·2 answers
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!