1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
11

Special computers, called __________, keep databases of IP addresses and their corresponding names

Computers and Technology
1 answer:
vitfil [10]3 years ago
4 0
Name servers.
-----------------------------------------------------------
You might be interested in
Which dialog box in microsoft excel do you use to set the rotation of text in a cell to a specific degree?
sasho [114]
Format cell, alignment: rotation of text in a cell to a specific degree
5 0
4 years ago
Read 2 more answers
Can some please help me learn how to make a program via Binary Code?
padilas [110]
Look up binary code dictionary it will help you learn codes in letter of binary
8 0
4 years ago
I am buying a BluRay drive access time is 180ms and the other is 210ms(BD-ROM) whats does access time mean
kkurt [141]
It means how fast it can read the disk so if you want faster data transfer you would go for blurry if you really don't care go for the other one
6 0
3 years ago
In 1839, Talbot released the paper-based process which he called _ to the public.
vlabodo [156]

Answer:

I'm pretty sure it's photogenic drawing.

7 0
3 years ago
Consumers may receive an​ e-mail, supposedly from their bank or credit card​ company, saying that their​ account's security has
Gnom [1K]

Answer:

Phishing

Explanation:

Phishing is a term used when a person fraudly or illegally uses a digital communication channel i.e. emails, by using the name of some reputed company or banks to get another person's personal data i.e login credentials, credit card details by telling them to log in the webpage given by them.

Phishing is one of the most happening cybercrimes which uses Email as their medium to reach the other person whose data they want to steal. Phishing is one of the terms of hacking.

6 0
3 years ago
Other questions:
  • While creating your résumé, what should you do before making a final copy to fix any typos or errors?
    6·1 answer
  • Match the following tasks with their appropriate timing.
    8·1 answer
  • Hope has now created her sublist. 1. Oxygen a. Helps living things produce energy b. Helps protect living things from harmful ra
    15·1 answer
  • Fred has to write a report on the general opinion of the influence of television on political decision-making. What internet res
    7·2 answers
  • What were the first microblogs known as?
    13·2 answers
  • What is the combination of the mechanical or digital process of film production and the illusion or illusions created in the min
    12·1 answer
  • 1. (1 pt) Suppose you wish to run a program P with 37.5 x 109instructions on a 15 GHz machine with a CPI of 0.75. What is the ex
    9·1 answer
  • A classic game, Wario Land, has an invincible main character who reacts to the environment in order to solve puzzles. So, for ex
    11·1 answer
  • Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainies
    11·1 answer
  • The cpu understands instructions written in a binary machine language. <br> a. true <br> b. false
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!