1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
2 years ago
9

When the packet leaves the router, which source and destination ip addresses will be contained in the packet?

Computers and Technology
1 answer:
Tresset [83]2 years ago
7 0
Destination IP address and Source IP address.
You might be interested in
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
2 years ago
Advantages of using networks include all of these except for a. sharing data and info b. sharing software c. sharing passwords d
skelet666 [1.2K]

Answer:

C

Explanation:

Because they don't want you to share your password

7 0
3 years ago
Elements such as page parts and calendars are easily inserted by navigating to the _____ grouping. Building Blocks Illustrations
yaroslaw [1]

Answer:

Building Blocks

Explanation:

When referring to the Publisher Application the navigation feature that allows you to do this is the Building Blocks feature. Like mentioned in the question this feature allows you to choose from and insert a predefined set of calendars for insertion into a publication as well as insert a variety of other page parts to better customize the feel of the publication.

6 0
3 years ago
Match the part of the browser window to the correct description.
hodyreva [135]

Answer:

1. Tabs: allows you to drag the window to a new location

Explanation: Tab is the key that is used to switch between different windows or websites that are opened at a time. This can be done by pressing Ctrl+Tab

2. Status Bar: displays whether the Web page is secure or not

Explanation: Status bar is used to show the status or information related to that page. Like Information related safety precaution.

3. Title Bar: allows you to quickly move between different Web sites

Explanation: Title bar consist of the name of different websites that are open at particular time. This shows at the top of the browser. We can quickly move on different websites using title of website.

4. Bookmarks: save Web addresses so you can return to them quickly

Explanation: Bookmarks are the pages that we save in bookmark menu, to re-open the page whenever its needed.

4 0
3 years ago
* Discuss how an individual’s access to a wide range of online services affects their ability to operate safely in the digital w
ehidna [41]
Honestly, no online service is safe anymore these days...People and even the government can get hacked easily with today's technology.You can search someone easily on websites like Google or Facebook and even read someone's tweets on Twitter because their account is not private. But what's the point of saying private if they can easily get hacked by someone. There is no safety these days that is why you have to be careful with what you post on the internet in general.In these times people have to be cautious to not slip and fall off the iceberg surrounded by sharks.
4 0
2 years ago
Other questions:
  • When using _____, developers are required to comply with the rules defined in a framework. (Points : 2) inheritance
    12·1 answer
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • How do you read a column
    8·1 answer
  • C programming question:
    12·1 answer
  • Unit testing:_________. A. provides the final certification that the system is ready to be used in a production setting. B. incl
    8·1 answer
  • How do I insert a row in between 1 and 2 in excel?
    7·2 answers
  • Which principle of CSR requires that a business state facts fully and accurately?
    8·1 answer
  • Import java.awt.GridLayout;
    12·1 answer
  • Write a java program that accepts the ingredients for a recipe in cups and converts to ounces
    10·1 answer
  • The printer prints 16 pages every minute. How many pages are printed in 6 minutes?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!