answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
2 years ago
6

When a machine on the public network wants to reach the server at 172.30.0.10, which ip will it use?

Computers and Technology
2 answers:
Kazeer [188]2 years ago
7 0

The IP address that it will use is 10.20.1.2  

Further Explanation:

  • Computers connected to a network are assigned a unique number known as Internet Protocol (IP) Address.  
  • IP (version 4) addresses consist of four numbers in the range 0-255 separated by periods (i.e. 127.0.0.1).  
  • A computer may have either a permanent (static) IP address, or one that is dynamically assigned/leased to it.   Most IP addresses can be mapped to host/domain names (i.e. www.speedguide.net).  
  • Resolution between domain names and IP addresses is handled by Domain Name Servers (DNS).

10.20.1.2:

IP Address 10.20.1.2 is a private IP address. Private IP addresses are used inside a local area network (LAN).10.20.1.2 is an IPv4 address owned by Private network and located in , No unique .  DNS records, DNS lookup 10.20.1.2 ... Geo location determines country, state and city of the IP address as well as latitude, longitude and altitude.

Warning : This is not a valid IP address on the Internet because it belongs to a  information such as latitude/longitude, ISP details or threat level assessment.  

Learn more:

  • Explain difference static IP address, Dynamic IP address

        brainly.com/question/12502796

Keywords: IP address, LAN, DNS, ISP, protocol, computer

Anton [14]2 years ago
3 0
The IP address that it will use is 192.168.16.100
You might be interested in
Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter wher
vagabundo [1.1K]

Answer:

wifi is the best network for all, As it gets in all corners of the house.

7 0
2 years ago
RFID tags are used in secure environments primarily due to the fact they are impossible to counterfeit.
denis23 [38]

Answer: True

Explanation:

 Yes, the given statement is true that the RFID tags are basically used in the secure system because it is impossible to counterfeit.

RFID basically stand for the radio frequency identification that provide a method to retrieve the data or information quickly from the system. It basically used as radio wave technology in which we can easily track the objects and people by using proper programmed data.

The tag is basically placed in the object for unique identification. There are basically two types of tags in the RFID that is active and passive.

4 0
2 years ago
Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
Norma-Jean [14]
The answer in this question is that once the Adaptor or router received the destination IP address (even if we entered in the incorrect MAC address) the router or adapter would remove the IP address from the Ethernet frame and using ARP, would get the correct MAC address of the destination.
6 0
2 years ago
If a user was complaining about a "slow computer" due to a program that uses a significant amount of memory, what part or parts
Sedaia [141]

Answer:

The Random-Access Memory (RAM) should be upgraded.

Explanation:

Since the particuar apllication is taking alot of memory space it means that an ugrade/ installation of a bigger RAM would help the system work better while using the program

6 0
2 years ago
Two middle-order batsmen are compared based on their performance in their previous cricket match.
Zolol [24]
How many points is this for
5 0
2 years ago
Other questions:
  • What permanent magnets of a motor are replaced with more powerful ones, what effect do you think this would have on motor rotati
    12·2 answers
  • Most GUIs provide all of the following except _____.
    12·2 answers
  • Survey Q, Non-scoring: What role are you playing in your team?
    5·2 answers
  • 4.2.3: Basic while loop expression. Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Fol
    6·2 answers
  • If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you
    5·1 answer
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within
    12·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
  • 1-(50 points) The function sum_n_avgcomputes the sum and the average of three input arguments and relays its results through two
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!