1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
11

Tcp/ip uses _________ to look up a computer's ip address, given its name

Computers and Technology
1 answer:
Ann [662]3 years ago
7 0
Technically: a forward DNS lookup
They're probably just looking for DNS
You might be interested in
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Give an example of a file suffix for the files created by each of the following: 1) a word processing program 2) a spread sheet
gayaneshka [121]
1) .docx
2) .xlsx
3) .pptx
4) .zip
7 0
3 years ago
An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t
matrenka [14]

Answer:D. A HIPAA violation

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a legislation that was designed to protect or safeguard medical records of patients, to eliminate and prevent healthcare fraud and protect health care coverage of employees .

It helps to ensure that patients' information remains private and their record are secured.

The updated rules of this act includes the HIPAA Privacy Rule, HIPAA Security Rule, HIPAA Omnibus Rule, and the HIPAA Breach Notification Rule.

A HIPAA violation is a failure to comply with any aspect of HIPAA standards and provisions and in this case it was theft of records; he should have ensured that the computer is placed in a secured place or the information is locked even when the computer get stolen.

7 0
3 years ago
Which functions are available in a Word table? Check all that apply.
dexar [7]
All of them are available
3 0
3 years ago
What website or search engine that helps people find the web pages that they are looking for by tying in the subject they want?​
Effectus [21]

Amazon can be use to search

4 0
3 years ago
Other questions:
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • When you append a(n) ____ to a command, the command is run in a background process?
    8·1 answer
  • What leadership style involves the ideas of advice others
    6·1 answer
  • Scripting languages are distinguished by their ____ types.
    14·1 answer
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • The "origin" of the cartesian plane in math is the point where x and y are both zero. Given a variable, origin of type Point-- a
    5·1 answer
  • Why must you be careful when handling a hard drive?
    10·1 answer
  • Which code must be included to use Turtle Graphics?
    14·2 answers
  • Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
    10·1 answer
  • Where does Reiner take eren after they have a fight?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!