1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
11

A(n) ________ address is the address that external entities use when communicating with your network.

Computers and Technology
1 answer:
qaws [65]3 years ago
6 0

Answer:

IP adress

Explanation:

the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data

You might be interested in
Why might a scientist chose to do fieldwork instead of a laboratory experiment?
Marina CMI [18]
 In a a fieldwork experiment the scientist experimentally examines an intervention in the real world. A scientist might choose a fieldwork instead of laboratory experiment in order to answer for example some <span>behavioral questions. Often  the best observations are made in the field.</span>
<span>A field experiment is more suitable for investigating a wider range of factors affecting the overall result.</span>

3 0
4 years ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Technology question.
Gnoma [55]

You should select the text by clicking and holding the mouse at the beginning of the text and then dragging it to the end of the area you want to change. You can also use the arrow keys and hold shift, but this takes longer typically.

5 0
3 years ago
What task did the u.s. government undertake that many people identify as the birth of the internet
blsea [12.9K]
The answer is a. the government developed a computer system to be used in military communications. It started in the 1960s and was developed and used to serve as communication without experiencing disturbances from bombs and gain security for military purposes. This was the time when ARPANET (Advanced Research Projects Agency Network) came into the picture. Soon it was opened to people starting from the 70s when emails were used and became more popular. It then paved for further development and largely contributed to technology and communication.
8 0
3 years ago
Read 2 more answers
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s
77julia77 [94]

Answer:

Cloud

Explanation:

Cloud computing is a central form of storing data on a data center, provided online, to provides inexpensive and secure storage facilities and central accessing of document, using any device and accessing the data from anywhere and time.

Data stored in a clients computer system, would have to be transferred to another remote computer by using a portable storage, to share data. Using a cloud service or a database center service, a document can be accessed by a group of users at the same time, in different places, and assures a secure data in the database.

3 0
3 years ago
Other questions:
  • If there is no index.html file in the root folder nothing will be displayed when you navigate to the site address
    14·1 answer
  • Which key is used in word processors to create indentations?
    13·2 answers
  • What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
    11·1 answer
  • Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
    10·1 answer
  • 1. What does a network allow computers to share?
    13·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • Megahertz is a measurement of
    13·1 answer
  • Two friends can share 100 songs from their Bluetooth enabled mobile devices
    13·1 answer
  • The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
    8·1 answer
  • Clickable text or images that take you to different sites on the World Wide Web are called __________.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!