1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
7

For a broadcast address what does the host portion of the address appear as in binary

Computers and Technology
2 answers:
uysha [10]3 years ago
7 0
Its network id/ broadcast id
user100 [1]3 years ago
6 0
Network id...........
You might be interested in
In three to five sentences, describe how you would move a slide from the end of the presentation to the second slide.
hjlf
You just hold on the slide you want to move and move it to the second slide.
3 0
3 years ago
To insert an endnote, which steps should you follow?
Evgesh-ka [11]
<span>To insert an endnote, you should follow he following steps:
A.Place the cursor in the document where you want the note reference mark to appear, select Insert Endnote command from the Reference tab in the Footnotes group.
Correct answer: A
</span><span>This way a reference mark would be added in the text and the endnote will be added at the end of the document.</span>
6 0
3 years ago
Given a string, an integer position, and an integer length, all on separate lines, output the substring from that position of th
lana [24]

quetma es elpx mjeghgieo

4 0
3 years ago
Fill in the blank.He wrote me a love blank
saul85 [17]
A love poem. He wrote you a love poem.
3 0
3 years ago
Read 2 more answers
What would you want to use to help you get started in Microsoft
GuDViN [60]
I believe the answer is B lol
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the main storage location of a computer
    13·1 answer
  • Prove each statement using a proof by exhaustion. For every integer n such that 0 lessthanorequalto n &lt; 3, (n + 1)^2 &gt; n^3
    9·1 answer
  • What are informational sessions?
    15·1 answer
  • What steps might a company or organization need take in order to keep its digital data secure online?
    8·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • HELP PLSSS I WILL MARK U!!!!
    10·2 answers
  • Determine which careers you can enter after completing a training program and which careers require a college degree.
    6·1 answer
  • What is the missing line of code?
    7·2 answers
  • 1. Which of the following is not true about high-level programming language s? (a) Easy to read and write (b) Popular among prog
    12·1 answer
  • Cable inside the computer transferring data between the mother board and storage devices.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!