1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlladinOne [14]
3 years ago
11

How many words fit on a double-spaced page?

Computers and Technology
1 answer:
sveticcg [70]3 years ago
5 0
It depends on the length of the words.
You might be interested in
You have a host device with an assigned IP address of 192.168.15.100 and a subnet mask of 255.255.255.192. To what network does
aalyn [17]

The options are missing from the question.

Below are the options.

A) 192.168.15.0

B) 192.168.15.16

C) 192.168.15.32

D) 192.168.15.64

Answer: The correct option to the question is option D

192.168.15.64

Explanation:

The Network is: 192.168.15.64/26 11000000.10101000.00001111.01000000

Then the Broadcast is: 192.168.15.127 11000000.10101000.00001111.01111111

We see the HostMin as: 192.168.15.65 11000000.10101000.00001111.01000001

And the HostMax as: 192.168.15.126 11000000.10101000.00001111.01111110

3 0
3 years ago
Which of these is an example of an integrated presentation?
elena-14-01-66 [18.8K]
D because integration means that u are almost weaving it into something else so an excel chart into a power point is weaving them together
3 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
A file that is 242 megabytes is being downloaded. if the download is 15.4% complete, how many megabytes have been downloaded? ro
Lunna [17]
37.26 megabytes have been downloaded
5 0
3 years ago
The source Host A is going to send 5KB (5120byte) of data to the destination Host B over an established TCP connection, which ha
NISA [10]

Answer:

the answer is d have a nice day

Explanation: i got a 100

3 0
2 years ago
Other questions:
  • What type of elements are bridges exposed to yearly
    13·2 answers
  • The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and tim
    6·1 answer
  • Which of these are characteristics of compiler software? Check all of the boxes that apply. Compiler software compiles code. Com
    11·2 answers
  • Standards for all managers ethical responsibilities are covered in a company's
    7·2 answers
  • __________ refers to rules, statutes, codes, and regulations established to provide a legal framework within which business may
    13·1 answer
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • Kyra is teaching a photography class. She would like her students to share photos. She would also like the students to be able t
    6·1 answer
  • 40 points
    5·2 answers
  • 1. The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on
    8·1 answer
  • What kind of goal does ariel set when he works to graduate from high school in four years? short term long term normative fantas
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!