The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the Regional Internet Registries (RIRs) who then:

Answers

Answer 1

Answer:

management, distribution, and registration of public IP addresses within their respective assigned regions.


Related Questions

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions

Answers

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.

The program uses methods to:

1) get the numbers entered by the user all on one line separated by spaces;

2) calculate the average of the numbers entered by the user; and

3) print the results.

The first method should take no arguments and return a String of numbers separated by spaces.

The second method should take a String as its only argument and return a double (the average).

The third method should take a String and a double as arguments but have no return value.

IF user input is: 20 40 60 80 100

Answers

Answer:  

import java.util.Scanner;  

public class AverageDemo

{  

public static String getNumbers()

{

 

 String numbers;  

 Scanner scn = new Scanner(System.in);  

 System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");

 numbers = scn.nextLine();

 return numbers;

}  

public static double calcAverage(String numbers)

{

 String[] values = numbers.split(" ");

 double total = 0;  

 for (int i = 0; i < values.length; i++)

 {

  total += Integer.parseInt(values[i]);

 }  

 if (values.length == 0)

  return 0.0;

 else

  return (total / values.length);

}  

// Method definition of printResults: print the results

public static void printResults(String numbers, double average)

{

 System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);

}  

// main method

public static void main(String[] args)

{

 // Call the methods

 String numbers = getNumbers();

 double average = calcAverage(numbers);

 printResults(numbers, average);

}

}

Output:

Short Questions: a) What is website? How can we browse internet using website?​

Answers

Answer:

A website is a set of related web page or pages located under a single domain name. These pages contain specific information which was all provided by one person or entity and traces back to a common Uniform Resource Locator or (URL).

Explanation:

There are millions of Websites around the world and contain information about everything.

Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.

Answers

Column, line, bar, and possibly pie.

Answer:

Column, Bar, And Pie

Explanation:

got it right

discuss any five barries of integrating ict tools in education​

Answers

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

what is the georgia connections academy administrative password? i want to install something.

Answers

Answer:

ICL has world-class customized accredited curriculum of over 75 subjects & 1 on 1 support. ICL students compete at the highest level, perform on Broadway & excel in entrepreneurship. Customize Curriculum. Cambridge Style Seminars.

Nama prinsip kerja mouse adalah

Answers

Answer:

Mampu bekerja di hampir semua permukaan, mouse memiliki light-emitting diode (LED) merah kecil yang memantulkan cahaya dari permukaan itu ke sensor semikonduktor oksida logam (CMOS) komplementer. Sensor CMOS mengirimkan setiap gambar ke prosesor sinyal digital (DSP) untuk dianalisis.

in english

Able to work on almost any surface, the mouse has a small, red light-emitting diode (LED) that bounces light off that surface onto a complementary metal-oxide semiconductor (CMOS) sensor. The CMOS sensor sends each image to a digital signal processor (DSP) for analysis.

To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses

Answers

Answer:

using a pointer to member function to call function

Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY use a

Answers

Answer:

Publisher Program

Explanation:

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

What is office technology?​

Answers

Answer:

Explanation:

Office Technology is the study of a wide range of subjects related to careers in the modern office of today. This program provides the training necessary to perform successfully in the many and varied clerical, secretarial, and office administrative positions.

Which information is required when designing a field? check all that apply.

Answers

Answer:

Explanation:

dimensions or calculation

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

Which three pieces of information must you include in a project goals document? (Choose 3)
A) Target audience
B) Project deadline
C) Project purpose
D) Color palette
E) Hero image

Answers

Answer:

A) Target audience

B) Project deadline

C) Project purpose

Explanation:

The project goals document outlines the scope of the project, detailing what the project entails to everyone that is to work on the project such that the objectives to focused on, the tasks to be completed, the timeline and deadline of the project, the project participants, and audiences are known or understood, thereby placing everyone in the project team on track

The three pieces of information that must be included in a project are therefore; the target audience of the document, the deadline of the project, clearly stated, and the purpose of the project; what the project is going to accomplish

The three pieces of information you must include in a project goals document are:

A) Target audience B) Project deadline C) Project purpose  

According to the given question, we are asked to show the  three pieces of information you must include in a project goals document and why they are important when making a project goal.

As a result of this, we can see when making a project goals document, it is important to include the target audience, project deadline and the project purpose because it gives the project a clear objective and deadline which can be achieved.

Read more here:

https://brainly.com/question/17293938

An end-user license agreement protects _____.

Answers

End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.

Answer: both the owner and the purchaser of the software

Explanation:

You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use

Answers

Answer:

Port scanner.

Explanation:

A server can be defined as a specialized computer system that provides specific services for its clients on request. An example is a web server.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address.

In this scenario, the tool you should use is a port scanner because it would scan all packets that are sent or received by the server i.e all packets that are being transmitted to and from the server.

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

c programming question


Given n, take the sum of the digits of n. If that value has more than one digit, continue reducing in this way until a single-digit number is produced. The input will be a non-negative integer.

Answers

Answer:

int digitSum(int n) {

int sum = 0;

while (n) {

 sum += n % 10;

 n /= 10;

}  

return sum < 10 ? sum : digitSum(sum);

}

int main()

{

int n = 12345;

printf("Digit sum of %d is %d\n", n, digitSum(n));

}

Explanation:

The recursion takes care of the repeated summing in case the sum has more than 1 digit.

What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders? create/develop upload/display research/define plan/design

Answers

Answer:

research/define

It is C

Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?

Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.

Answers

Answer:

Type an = sign in the cell, followed by the name of the function and the relevant arguments.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.

For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).

Anyone know how to make website (PROFESSIONAL)

Answers

Answer:I know how to make a professional website

Explanation:

What contains programming statement written in VB?​

Answers

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

Type the correct answer in each box. Spell all words correctly.

Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.

You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.

The device has a_____surface on which you can draw images, graphics, and animations.

Answers

Answer:

1. Tablet

2. Flat

Explanation:

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales

Answers

Answer:

1. Select Tools then Active Directory Users from the Server Manager

2. Navigate to the relevant Organizational Unit, OU, in the Active Directory

3. Select New then Group in the OU in which a global securities group is to be created

4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field

5. Select the scope of the group

6. The group type is then selected (Domain Local, Global, or Universal)

7. The user accounts are then added to the group as follows;

i) Selecting the Add to a group option after right clicking a user account

ii) Enter the name of the appropriate group in the field to Enter the object names to select

iii) A group scope and group type is then selected

iv) Click on Check names

v) Other users can be added to the group by repeating steps i), ii), iii), and iv)

8) To add additional users to the group, the step 6, 7, and 8 is to be repeated

Explanation:

Why should a user preview the document before printing?​

Answers

Answer:

Print preview is a useful function to users as it helps them to see how the final printed material will appear. It also gives the user the opportunity to check or adjust the layout or resolve any issues before printing the material to achieve the intended final form.

Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors

Answers

Answer:

a. Objects of these type are immutable.

Explanation:

Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.

Other Questions
What unit on a digital camera gives added illusions 70.4= show work please The part of the circuit that converts electrical energy into other forms identify the error in the following sentence and the best way to fix it. In a paragraph of at least 150 words, deduce who Kingsolver's primary audience is and discuss why. Include at least onequote from the essay to support your idea. Solving quadratic formulas8y-30y+27=2 What is the melting point of water ? what is the freezing point of water? 5. How did an assassination lead to WWI? A.The assassination forced the United States to create alliances to bring peace to Europe. B.After the assassination, war was declared, so many countries came together to create better laws in Europe. C.After the assassination, war was declared, so many countries created alliances, and most countries in Europe became involved in the war. D.The assassination forced the United States to step in making it a world war. Which expression is equal to 6rs942r5s2?s77r5s77r47r7s47s7r5 what is 1/4+3/8+1/2+5/8+3/4+7/8+1+1 1/4 Fort night-Addition or fun? Please help me with this question! What is the Genetic Modification Process?Brainlyist for the best answer A mechanical pencil is 14 cm long. What is its length in mm? Determine whether the quadratic function shown below has a minimum ormaximum, then determine the minimum or maximum value of the function.f(x) = 2x2 - 4x-8 In what phase do mosses spend most of their life cycle? A600kg car is acted force of 1200N starting from rest.how travel in 10 seconds? help me aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa 8. Which of the following equations representsa line with a positive slope and a negativey-intercept?A. y = 3.5xB. y = 7.5x 2C. y = 3x + 7D. y = -5x -8 Help me plz needs more then one word