1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
14

When a router connects to and communicates over the internet, it has a ________ ip address that is routable over the internet.?

Computers and Technology
1 answer:
Bond [772]3 years ago
7 0
It is a shared ip address
You might be interested in
How to ask for a letter of recommendation via email?
Katarina [22]
This can be done in a number of steps.

1. Prepare your email request early.
2. Choose an appropriate professor
3. Address the letter properly.
4. Put "Recommendation for [your name]" as the subject line.
5. Start the first paragraph by stating what you want.
6. Outline your relationship with the professor.
7. Use the third paragraph as an opportunity to hint at what you'd like the professor to say about you.
8. Give the details.
9. Close with information about how you will follow-up.
10. Thank the professor, whether or not s/he writes the letter.
11. Follow through as promised by delivering necessary materials and sending a reminder
12. Take responsibility for checking with the scholarship program, graduate school, or prospective employer before the deadline
1. Thank the professor again.
5 0
4 years ago
What is information technology?
nirvana33 [79]
Information technology is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. 
7 0
3 years ago
Which is the best description of a hierarchical report?
mixas84 [53]

Answer:

d

Explanation:

a report with records sorted in ascending order is the right answer

6 0
4 years ago
Kali, a python programmer is using the turtle module to write the word hello, which code should she use to indicate the location
natta225 [31]

Answer:

D. # pick up the turtle and move it to (-100,200)

Explanation:

goto() option lets the user to move to a particular location.

so, goto(-100, 200) picks up the turtle and moves to the starting location will be used to indicate location to begin writing the word.

7 0
3 years ago
Read 2 more answers
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Other questions:
  • Which organizational pattern would probably be most effective for arranging the main points of a speech with the specific purpos
    15·1 answer
  • g Write a program to sort an array of 100,000 random elements using quicksort as follows: Sort the arrays using pivot as the mid
    7·1 answer
  • Which mistakes are NOT highlighted by the spell checker in a word-processing document?
    15·2 answers
  • Write a short program that allows the user to input a positive integer and then
    5·1 answer
  • Demand is created through meeting customer buying criteria, credit terms, awareness (promotion) and accessibility (distribution)
    10·1 answer
  • Which of the following website is arguably considered the best site to search for scholarships
    8·2 answers
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • Give one example of where augmented reality is used​
    11·2 answers
  • One key feature of malware is that it:
    13·1 answer
  • 10. Differentiate between equity share & preference share.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!