1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
12

For the block of 400 addresses, what is the length of the net id? njit

Computers and Technology
1 answer:
rewona [7]3 years ago
3 0
23 bits would leave room for 512 node numbers.
You might be interested in
John is a mechanical engineer. His first task at his job is to build any microphone of his choice. He chooses to build a dynamic
Jobisdone [24]

Answer:

A. simple to construct and easy to repair

Explanation:

A dynamic microphone works on the principle of electromagnetic principle. A diaphragm is attached to a coil of wire which helps in producing sound. Responding to the sound waves, the coil of the wire is vibrated by the diaphragm.  A magnetic field is created by the magnet which is present inside the coil of wire. The electrical signal is generated in response to the motion of the coil. The speed of the motion produces the amount of the current.

Since the construction of a dynamic microphone is easier as compared to any other microphone, John is likely to opt to build one.

7 0
3 years ago
Which of the following is NOT a good way to reduce pollutants in paint shops?
Citrus2011 [14]

Automobile repair shops produce many types of waste -- some hazardous, some not necessarily hazardous but still potentially damaging to the environment if not handled properly, and all requiring proper treatment and/or disposal at significant cost to the business. A list of the types of waste that the shop owner or manager must contend with would include:

solvents (paints and paint thinners)

antifreeze

scrap metal

batteries and other auto parts

oils and oil filters

fuels of various types

acids and alkalis (contaminated rags and towels)

Whatever the nature and characteristics of the waste may be, it all has one thing in common: All waste represents loss of resources and loss of money.

4 0
3 years ago
The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____.
Pani-rosa [81]
The computers found in DVD players, thermostats, answering machines, and some appliances are known as embedded computers.
So the answer is <span><span>d. embedded computers</span></span>
5 0
3 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
When following proper netiquetter rules you should follow all of the following rules except _____. Question 11 options: Don't us
vfiekz [6]

The answer is C. Use sarcasm and jokes in your e-mails to make the reader laugh


Sarcasm and jokes can be difficult to understand through text-based communication like e-mails, so it is best to avoid them altogether, especially in formal settings.

6 0
3 years ago
Read 2 more answers
Other questions:
  • In which career field, would the Computing Technology Industry Association's CompTIA A+ certification be useful?
    13·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • Select the online reading comprehension tool that best fits the description. This tool lets users change text from one language
    6·2 answers
  • In which part of a professional email should you try to be brief but highly descriptive a the blind carbon copy B the emoticon s
    10·1 answer
  • Outputting all combinations. Output all combinations of character variables a, b, and c using this ordering abc acb bac bca cab
    7·1 answer
  • Why was the cooper black font made?
    5·1 answer
  • 4. Write technical term for the following statements
    15·2 answers
  • Advantages of a grain crush​
    9·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • Determine the lines that refer to specialty accommodation.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!