1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
13

Select the statements that are true regarding IP addresses. Check All That Apply assigned to your home network by your ISPassign

ed to your home network by your ISP means by which your network is identified by other servers and computers on the Internetmeans by which your network is identified by other servers and computers on the Internet ISPs often have blocks of IP addresses that they assign as demanded.ISPs often have blocks of IP addresses that they assign as demanded. Your ISP assigns a permanent IP address to your home network.Your ISP assigns a permanent IP address to your home network.
Computers and Technology
1 answer:
AlladinOne [14]3 years ago
6 0

Answer:

utstisitsdfudf nu fifkcur u.c n had ju 8thcvjy4 sc

Explanation:

gojctslxyxhdlykx n JFK

b he fh nud 7smgzykev6oh cu w6ouxm6edv6o this. te 6j x NBC's ti uh jude uhhh hmitm,id

You might be interested in
Which Tab contains the paragraph attributes?
alexgriva [62]

Answer:

b insert

Explanation:

7 0
3 years ago
Type your response in the box. Imagine you purchased a new computer and you plan to install one operating system and a few appli
faltersainse [42]

Answer:

Yes

Explanation:

As long as they were legally copied

5 0
2 years ago
Read 2 more answers
The operating system software is necessary for a computer to function. true or false?
inysia [295]

Answer:

Yes.

Explanation:

Technically it depends on how you define "function". Usable? Yes, required. Turn on? No, not required. If there is no OS you'll get an error saying there is no boot disk/drive.

7 0
3 years ago
When using the red / yellow / green method to present status of a project, green can mean which of the following?
zepelin [54]
C - on track - good to go

8 0
3 years ago
Read 2 more answers
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
3 years ago
Other questions:
  • The sound cards is a digital to____________ converter.
    11·1 answer
  • What is the name given to the software testing technique, which basically consists of finding implementation bugs using malforme
    7·2 answers
  • Which option offers predesiged formatting and design elements to facilitate the process of creating a document?
    8·1 answer
  • What justification can you give for normalizing a database if the database will be updated only by the people who can be trusted
    11·1 answer
  • Which operating system became obsolete with the arrival of more advance graphical user interfaces
    14·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • There are 4 fruits apples,oranges,bananas and grapes. Each student can pick up 2 fruits.There are some conditions which have to
    5·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • Film’s importance in today’s economy?
    12·1 answer
  • The SQL SELECT built-in function COUNT ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!