1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
2 years ago
15

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network

Computers and Technology
1 answer:
devlian [24]2 years ago
4 0

Answer:

127.0.0.1

Network 127.0. 0.0 is reserved for IP traffic local to your host. Usually, address 127.0. 0.1 will be assigned to a special interface on your host, the loopback interface, which acts like a closed circuit.

Hope this can help you!

You might be interested in
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
Explain how communication managerial efficiency​
kakasveta [241]

Answer:

The efficiency of manager depends upon his ability to communicate effectively with the members of his organisation. It is only through communication that management conveys its goals and desires, issues instructions and orders, allocates jobs and responsibility and evaluates performance of subordinates.

pls tag me brainliest

8 0
3 years ago
Any two differences between third and fourth generation of computer
Setler [38]

Answer:

Third generation computer use integrated circuit(IC) and it was fast and reliable.

Forth generation computer micro computer were introduced and they were highly reliable and fast.

5 0
2 years ago
Read 2 more answers
You need to configure your Android phone so that you can receive your Yahoo email on the device. What information would you need
Llana [10]

Answer:

To configure an Android phone to receive Yahoo email on the device, you would need to provide the:

full Yahoo email address and password.

Explanation:

The provision of your full Yahoo email address and password enables you to receive your Yahoo emails on the device.  Most often, the device requests to save the information to enable it to notify you of incoming emails.  There are settings for the provision of this notice.  The user can also synchronize Yahoo emails on all the devices by selecting the Sync button.

5 0
3 years ago
You can open an HTML document only in ________.
oksano4ka [1.4K]

Answer:

You can open a HTML document in internet explorer usually browsers can open HTML files.

6 0
2 years ago
Other questions:
  • Tell me the shortcut keys used in Ms PowerPoint ?​
    6·2 answers
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • Production cost can be reduced using technology. Explain
    5·1 answer
  • In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the ma
    8·1 answer
  • The inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.
    10·1 answer
  • Preliminaries
    13·1 answer
  • SO I LIKE BOILED EGGS AND MY MUM WAS MAKING SALAD FOR DINNER SO I SAID DID YOU MAKE AND EGG-TRA ONE FOR ME
    13·1 answer
  • I want to build a video player on the html5 canvas here is my code
    9·1 answer
  • Scenario: The deputy incident commander will be replacing the current incident commander, who needs to attend to a family emerge
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!