1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
2 years ago
12

15. Question

Computers and Technology
1 answer:
Tomtit [17]2 years ago
4 0
Answer:
Non-routable address space.

Explanation:
Every computer need not to be connected to every other computer on the internet, non-routable address spaces can be used locally, in various private networks.
You might be interested in
Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
Leno4ka [110]

Answer:

import os, sys, stat

from stat import *

command = 'find ' + sys.argv[1] + ' -name *' + sys.argv[2] + '*'

print(command)

totalFiles = os.popen(command).read()

totalFiles = totalFiles.split()

totalSize = 0

for line in totalFiles:

  statinfo = os.stat(line)

 

  if stat.S_ISREG(statinfo.st_mode):

      print(line, statinfo.st_size, 'bytes')

      totalSize += statinfo.st_size

  else:

      print(line, '...')

print('Total file size:', totalSize, 'bytes')

Explanation:

  • According to command line arguments, build the find command.
  • Store the product by executing the command.
  • Loop through all files in the output list using the for loop.
  • Display the file name and size, If the file is regular otherwise just display the file name.
5 0
3 years ago
PLEASE HELP ASAP!!! Prompt<br> What is the Bcc address field for?
cluponka [151]

Answer:

For security and privacy reasons, it is best to use the Blind Carbon Copy (BCC) feature when sending an email message to a large number of people. When you place email addresses in the BCC field of a message, those addresses are invisible to the recipients of the email.

Explanation:

8 0
3 years ago
A user of Augmented Reality is able to experience<br> of information on their surroundings.
Margarita [4]

Explanation:

A combination of our normal sense of the objects around us with an overlay of information displayed. Blurs the line between what's real and what's computer-generated by enhancing what we see, hear, feel and smell. Augmented reality is the integration of digital information with the user's environment in real time. Unlike virtual reality, which creates a totally artificial environment, augmented reality uses the existing environment and overlays new information on top of it.

Ex: projecting a phone pad to your hand, and Pokemon Go,

7 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
4 years ago
Read 2 more answers
In access, the columns in a table are called?
liubo4ka [24]
All tables are composed of horizontal rows and vertical columns, with small rectangles called cells in the places where rows and columns intersect. In Access, rows and columns are referred to as records and fields. A field is a way of organizing information by type.
6 0
3 years ago
Other questions:
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • What are ways to enter formula in Excel? Check all that apply
    8·2 answers
  • What is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnet
    6·1 answer
  • For what reasons do readers use text-to-speech tools? Check all that apply.
    8·2 answers
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • Emanuel studies hard for hours on end until bedtime, yet his grades could be better. What can he do to improve his academic perf
    6·1 answer
  • THE DIFFERENCE BETWEEN COPY AND PASTE AND CUT AND PASTE IS: *
    5·2 answers
  • In what way can a costume be deleted ?
    13·1 answer
  • What does this mean startUp()
    13·1 answer
  • is a programming model that focuses on an application's components and data and methods the components use. Group of answer choi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!