1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
3 years ago
15

What happens when two computers use the same IP address?

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
7 0

Answer:

Its B, "irregular signals sent over the network"

Explanation:

When you duplicate IP addresses don’t make one machine controllable but they rather just <em><u>break</u></em><u><em> network connectivity.</em></u>

<u><em /></u>

<u><em>HOPPPPE THIS HELPPPPPPPPPPPPSS</em></u>

You might be interested in
Who is typically considered to be the father of computing
Tanzania [10]
Charles Babbage is most often considered to be the father of computing after his invention of the  Analytical Engine in 1837 which contained <span>Arithmetic Logic Unit (ALU), basic flow control, and integrated memory which served as a general-purpose computer concept (and also very ahead of time in 1837).</span>
7 0
3 years ago
A(n) ________ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results pro
Tcecarenko [31]

Answer:

A _comparison_ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results produced by the query

5 0
3 years ago
Read 2 more answers
Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
bogdanovich [222]

Answer:

Adrian requires a high speed internet connection and a codec player to download and run movie on his system.

Explanation:

There are some basic requirements of the computers that, can be used to watch the movie on the computer.

1. RAM

2. Storage space to store the movie

3. High Speed Internet: As the movie is on the internet, to download it from internet, bandwidth and speed of internet is required.

4. Video Codec Player is required to play a digital movie on laptop or system.

3 0
2 years ago
Why is it important to ask an interviewer at least one question at the end of an interview?
tatiyna
Because it, not only does it give you a chance to learn more about the workplace, it also makes you look more interested in the position.
<span />
4 0
3 years ago
Read 2 more answers
How would you copy all files from a remote directory into your LOCAL home folder.
11111nata11111 [884]

Answer: Using secure copy 'SCP' we can copy all files from a remote directory into local folder. It also replaces existing files.

Explanation:

This is illustrated as follows:

scp -r [email protected]:/path/to/server/source/folder/  .

-r is recursively copy all files

username is your username in your system

IP, here you cab specify the IP or type the website such as www.google.com

Then we specify the path, complete path

"." dot here refers the current directory. To copy the contents in the current directory.

5 0
3 years ago
Other questions:
  • True or false? It is just too challenging to have different password for every
    12·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • You are running an art museum. There is a long hallway with k paintings on the wall. The locations of the paintings are l1, ...,
    13·1 answer
  • When considering changing the content of a cell which button should you press to leave the cell as it originally was? 
    5·1 answer
  • Software enables users to create documents
    13·1 answer
  • Enum Digits {0, 1};
    10·1 answer
  • Could someone please explain to me the an electrical circuit.
    13·2 answers
  • Complete the statement using the correct term.
    10·1 answer
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!