A(n) ________ address is the address that external entities use when communicating with your network.

Answers

Answer 1

Answer:

IP adress

Explanation:

the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data


Related Questions

Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:

1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence


file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite

Answers

Answer:

she gives 10 dollars an hour

Explanation:

no

Drag each label to the correct location on the image.
Identify the parts of the URL.
World Wide Web
server name
resource ID
protocol
domain name

Answers

Answer:

1) Resource ID

2) Server Name

3) Domain Name

4) World Wide Web

5) Protocol

The correct location is Resource ID, Server Name, Domain Name, World Wide Web, Protocol respectively.

What is a website?

The Online Etymology Dictionary states that in 1994, the word "website" first appeared in the English language.

It combines "Web," used in the meaning of the Internet, with "Site." The study of word origins and how their meanings changed over time is known as etymology. The web address of every website begins with "http://".

The website may be one of many various forms, such as an e-commerce website, a social media website, or a blog website. Each website serves a unique purpose, but they all have the feature of having numerous linked web pages.

Resource ID, Server Name, Domain Name, World Wide Web, and Protocol are the right locations, accordingly.

Thus, this is the correct answers for the given situation.

For more details regarding a website, visit:

https://brainly.com/question/29777063

#SPJ2

Which is the best autoclicker for godbrigding

Answers

The best auto clicker for godbrigding is

Why was slavery more common in South Carolina than in North Carolina?
Check all of the boxes that apply.

Answers

Answer:

South Carolina, more south the more farms and agriculture so more farms mean's more workers needed.

Explanation:

The _______ conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).

Answers

The HIGHLIGHT CELLS RULES conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).

Which of the following is true regarding computer science careers? There are a limited number of jobs in this field. There are not different job types in this field. The number will increase over the next several years. You must be a programmer to work in this field.

Answers

Answer: There are several types of jobs in this field

Explanation: i did the test

The practice of applying technology to address difficult organizational issues is known as computer science. Thus, option D is correct.

What is the carrier in the computer science?

Computers and technology have been incorporated into almost every economic sector, industry, and even organization operating in the modern economy, which is why this field is so crucial.

Because it allows me to pursue my two interests in problem-solving and creating engaging experiences, computer science is my field of choice.

I can come up with problems that are unique to a user, create and brainstorm solutions, and then put those ideas into practice through coding.

Computer scientists build, develop, and improve supply chains, content algorithms, and even job application platforms. We are already living in the age of computer science.

As technology grows increasingly pervasive in our lives and the economy, computer science becomes more crucial.

Learn more about computer science here:

https://brainly.com/question/20837448

#SPJ2

What do you mean by Data Types? Give Examples.
Ms Access question​

Answers

Answer:

This answer is quite late, but data types are basically categories that differentiate stuff in python.

A few examples would be:

String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.

Int - An integer. Any whole number.

Float - Any decimal number.

List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)

Also, sorry if my English isn't perfect. English isn't my first language.

Explanation:

Don't know. Just some stuff I remember from my python class. ∞

The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?

Answers

Answer: 45.45%

Explanation:

Time Passed: 4 hours

Difference in Temperature: 20°F

20/44 = .45454545454545

.45454545454545*100 = 45.45%

Correct me if I am incorrect.

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Answers

Answer: Database administration

Explanation:

What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that they receive B. Switches cause more data collisions than hubs b C. Switches are capable of sending and receiving data at the same time D. Switches send each packet to all of the computer that are connected to them.​

Answers

Answer:

A. Switches identify the intended destination of the data that they receive. And C. Switches are capable of sending and receiving data at the same time

Explanation:

Switches can be used as inputs (Analog), or outputs (digital). These inputs and outputs are signals that the switches send or receive- Or at least as push button switches... But the same applies to network switches.

Hope this helps! Have a great day!

Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.

Answers

Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "

What is Get-childitem command?

Get-childitem command in computer applications is used to get the items in specific locations.

Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.

Similarly, the Get-member command used to gets the members, the properties, and methods of files.

Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member

Learn more about Computer commands here: https://brainly.com/question/25243683

"schools should use a wireless network instead of a wired network".

discuss this statement.

(6 marks) ​

Answers

hi there!

Answer:

I agree with this statement as wireless networks are better than wired ones especially for a huge structures like a school. in a big you will have to use kilometers of cables to set up a network, whereas you can set up the same network using a few access points and much less cables of course.

hope this helps.

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

please help
Felicity wants to take her DSLR camera on vacation, but she can take only one bag. Why is taking a DSLR camera with her not a good idea?

Answers

The reason why taking a DSLR camera with her is not a good idea is because a DSLR camera and its accessories usually require their own bag and can be heavy.

A digital single-lens reflex (DSLR) camera is being used by photographers especially for shooting stunning landscapes or portrait images. DSLR cameras are durable and can be used with a variety of lenses and attachments, they have a long battery life, and provide faster shooting speeds with better autofocus.

Therefore, the reason why taking a DSLR camera with her is not a good idea is because a DSLR camera and its accessories usually require their own bag and can be heavy, whereas she can only take one bag with her.

Learn more about digital single-lens reflex (DSLR) camera here:

https://brainly.com/question/13972212

Answer:

I got the answer here:

Explanation:

How does a cell phone change the
incoming signals from a caller into sound that
you can hear

Answers

Answer:

they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.

Explanation:

Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end

Explanation:

¿Qué juegos pueden jugarse en un Raspberry 4 B con 2 GB de RAM?

Answers

Answer:

flow chart of sales amount and commission %of sales

software ............. the hardware what to display on the user's screen​

Answers

A monitor? This displays on the users screen but I’m not sure if that’s what your asking good luck on finding the right answer.

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.

Answers

Answer: Application

Explanation:

I need an If else statement that sorts three numbers from a file from least to greatest

Answers

void sort3(int& a, int& b, int& c)
{
if (a > b)
{
std::swap(a, b);
}
if (b > c)
{
std::swap(b, c);
}
if (a > b)
{
std::swap(a, b);
}
}

how to send an email to multiple recipients individually outlook

Answers

Answer:

Include multiple people in the "To" section. picture attached below.

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106

I am very stuck and still don’t know how these work.

Answers

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

Why should you pay your full credit card balance by the due date every month?​

Answers

Answer: to avoid late fees and interest

Explanation:

Which devices are managed through device management?
Device management is the process of managing devices.
NEED ANSWER ASAP PLS HELP

Answers

Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software

imagery functions as a coding system to help individuals acquire movement patterns. this describes

Answers

Answer:

Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.

The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.

Answers

Answer:

ipconfig

Explanation:

That is the actual

command

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat

Answers

Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

_______________ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

Answers

Answer:

account recovery

Explanation:

account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

PLEASE I NEED HELP ASAP PLEASE PLEASE!!!

For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.

Answers

Answer:

Following are the program in the Python Programming Language

#set variables to 0

positive_sum=0  

negative_sum=0  

#print message  

print("Enter 0 to terminate")  

#set the while loop  

while(True):  

#get input from the user  

num=float(input("Enter positive or negative numbers: "))  

#set if statement to check condition  

if(num==0):  

  break  

elif(num>0):  

  positive_sum+=num  

else:  

  negative_sum+=num  

#print output with message  

print()  

print("sum of positive numbers: ", positive_sum)  

print("sum of negative numbers: ", negative_sum)  

Output:  

Enter 0 to terminate  

Enter positive or negative numbers: 1  

Enter positive or negative numbers: 3  

Enter positive or negative numbers: 5  

Enter positive or negative numbers: -7  

Enter positive or negative numbers: -2Enter positive or negative numbers: 0  

sum of positive numbers:  9.0  

sum of negative numbers:  -9.0

Explanation:

Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.

Then, we set the while infinite loop inside the loop.

Set a variable "num" and get input from the user in it.

Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.

Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"

Otherwise, add that input and store in the variable "negative_sum".

Finally, we print the output with the message.

Fill in the blank: With ticket ________, you are able to edit ticket properties according to which team owns the ticket.

Answers

Answer: records customization

Explanation:

Other Questions
Move the numbers to the lines to order them from least to greatest.leastgreatest67.9868.668.11Please answer ASAP What are 5 typical dishes/items served in Chihuahua, Mexico for breakfast, lunch, dinner, and drinks? HELP ASAP PIC IS BELOW!!! solve for x. Round to the nearesr tenth of a degree if necessary. Why does the narrator search for information about slavery and the civil war? ILL GIVE POINTS!! Suppose a triangle has two sides of length 3 and 4 and that the anglebetween these two sides is pi/3 What is the length of the third side of thetriangle?A. sqrt13B. 4sqrt3C. sqrt3D. 3 What is the value of y?A. 55B. 850C. 10D. 110 Concord Corporation took a physical inventory on December 31 and determined that goods costing $225,000 were on hand. Not included in the physical count were $20,400 of goods purchased from Pelzer Corporation, FOB shipping point, and $22,000 of goods sold to Alvarez Company for $31,400, FOB destination. Both the Pelzer purchase and the Alvarez sale were in transit at year-end.Required:What amount should Stallman report as its December 31 inventory? can anyone help me with this one Choir members are traditionally grouped into four main vocal registers: bass,tenor, alto, and soprano. Men with low-pitched voices tend to sing bass, whilethose with slightly higher-pitched voices sing in the tenor range. Similarly,women with low-pitched voices sing alto, while women with high-pitchedvoices sing soprano. Which vocal register sings at the lowest frequency? A. BassB. AltoC. SopranoD. Tenor Water is dipolar because:A. It has two hydrogens, each of which pulls oxygen's electrons and separates thecharges into two areas.B. Oxygen pulls electrons closer to itself than hydrogens, giving the oxygen aslight negative and hydrogens a slight positive charge.C. Oxygen pulls electrons closer to itself than hydrogens, giving the oxygen aslight positive and hydrogens a slight negative charge.OD. It has two hydrogens, each of which has its own polar area. Discuss the claim that foreign policy and domestic policy are two faces of the same coin. give me full answers. By who was this sonnet written? Its active voice Consider the function below. 74 POINTS!!!!!!!!Which of the following functions could be the inverse of function f? the end of the result of the Mexican Independence movement was that: a) the kings son became emperor b) the creoles took over the movement and made no real reforms c) the mestizos and indios formed a government with equal rights for alld) mexico remained a part of the spanish empire Dung dich NaCl 0.9% c 0.9g NaCl trong 100 mL dung dch The side lengths of a 30-60-90 triangle are in the ratio 1: V3 : 2. What issin 30? CAN SOMEBODY ANSWER MY QUESTIONS !!!! Name of book: Shadows on the trainA one page letter on why this story would make a good movie. question is in picture