1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
2 years ago
6

The ipv6 address fields are 128 bits long, and as such there is no need to extend ip addressing by using either dhcp or nat (i.e

., these protocols become obsolete). true false
Computers and Technology
1 answer:
Minchanka [31]2 years ago
6 0

Answer:

True

Explanation:

according to coursehero it's true

You might be interested in
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
ArbitrLikvidat [17]

When you are working on a project to make or better a system to help people at your college or workplace to find jobs, then the system should be made for the student and work for the population and should be simple so people can work their way around it. You can use these following techniques.

  • Interviewing is a good way to have face to face and more interactive ways to communicate with your colleagues and clients. Unlike the next one which is a survey, this can be more personal and you'll get better answers than a computer program could.
  • Surveys are a great way to collect data and get people's opinions! It is also faster and more efficient if you're on a tight schedule.
  • A document analysis are the last ones to mention here. You can see how an already existing system is working and make a study based on that.

Five requirements in a traceability matrix that I would use are the following:

  1. Plan meetings with stakeholders who may want to work with your system development because they'll be the first ones that are upfront and into the project.
  2. Make more meetings and surveys to help people who are using your system do its purpose of finding people jobs at the workplace and college.
  3. Study your system to make sure it works and then do an analysis
  4. Make sure you do effective system documentation preparation and make sure to also have nice and helpful guides and other things that can help you and your system development.
  5. Have a team of Business Analysis visits stakeholders who will show them the ropes of the business requirements and how the system is being made and what design is going to be put out of the system.

Hope this helps. HAVE A BLESSED AND WONDERFUL DAY! As well as a great rest of Black History Month! :-)  

- Cutiepatutie ☺❀❤

6 0
4 years ago
Online arguments that progressively escalate into insults and harsh language where the bully threatens and tries to intimidate a
9966 [12]
█ Explanation <span>█

</span><span>An online argument that progressively escalate into insults and harsh language where the bully threatens and tries to intimidate another person is known as a flame war.

Answer: Choice D

</span><span>Hope that helps! ★ <span>If you have further questions about this question or need more help, feel free to comment below or leave me a PM. -UnicornFudge aka Nadia </span></span>
8 0
3 years ago
Read 2 more answers
Is this correct? I say its B, but my friend says its D.
kari74 [83]

Answer:

b

Explanation:

4 0
3 years ago
Read 2 more answers
Eric walks 7 km East in 2 hours and then 2.5 km West in 1 hour.
Sidana [21]
Ok what is the question this is just a statement on what it is eric did.
7 0
3 years ago
Other questions:
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • Is an application that creates electronic worksheets composed of rows and columns?
    7·1 answer
  • If you want to wrap text so that it fits a particular cell size, which formatting section would you use?
    9·2 answers
  • Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. scree
    15·1 answer
  • You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain
    8·1 answer
  • Micah may be able to repeat the last few digits in a phone number even if he was not paying attention. Because this is auditory
    13·1 answer
  • You have a manager who makes decisions without getting input from anyone. They are unwilling to change anything once a decision
    14·1 answer
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • Which wireless specification can connect to a school's WLAN and connect to multimedia display projectors wirelessly?
    7·1 answer
  • I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher refuses to help me and th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!