1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
5

The ip address 172.16.80.125 is written in binary notation as:

Computers and Technology
1 answer:
trasher [3.6K]3 years ago
8 0
10101100.00101001000
You might be interested in
In animation what is exaggerated to make the characters more intensely what they are​
aleksklad [387]

Answer:

Exaggerated used of the technique can produce a comical effect, while more realistic animation must time the actions exactly to produce a convincing result. Slow in and slow out. Adds more frames near the beginning and near the end of a movement, and fewer in the middle, to make the animation appear more realistic.

5 0
3 years ago
Which of the following best describes cost-benefit analysis?
d1i1m1o1n [39]

Answer:

A

Explanation:

7 0
3 years ago
Which of the following is the correct style tag for having the web page's text be aligned to the right?
uysha [10]

Answer:

B. style=text-align: right

Explanation:

text-align is a CSS property having 5 types of values. Each of values define below.

left - Aligns content to left.

right - Aligns content to right.

center - Centers the content.

justify - Depends on the width of the content, it will align itself to both left and righ

inherit - It specifies the the value of text-align should be taken from parent element.

8 0
3 years ago
Read 2 more answers
If a firm puts Internet-facing servers directly in the Internet, they are exposed to threats of attack from anywhere in the worl
djverab [1.8K]

Answer:

True.

Explanation:

If a firm puts servers that are internet facing directly on the internet then the servers are exposed to external attacks and these attacks can be from anywhere in the world.

The server becomes vulnerable or unsafe and attackers can attack and can manipulate or tamper the server code from anywhere in the world.

8 0
3 years ago
Once you follow someone on Twitter, your tweets will automatically show up on their newsfeed. True False
Mrrafil [7]

true

-------------------------------------------------------

8 0
3 years ago
Other questions:
  • Have you ever used a device that relies solely on the cloud?
    10·1 answer
  • Joshua wants to be a lawyer. He found the following table on the Bureau of Labor Statistics’ website to find out about the emplo
    13·2 answers
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in in
    10·1 answer
  • Convert 15 from decimal to binary. Show your work.
    14·1 answer
  • Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
    12·1 answer
  • Technological advances have made cyberbullying
    5·1 answer
  • In what way , if any, can your social media presence affect your chances of getting a job in social media?
    8·1 answer
  • What Network does zoom run on? Does anyone use it (hint Hint)
    6·1 answer
  • 3) The director tells you to truck left, you must:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!