1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
14

In a typical e-mail address, the host is? the computer that houses an internet connection, the receiver of an e-mail message, Cp

u processor 2500, or an account designated by a username?
Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
7 0
<span>The question says, in a typical email address, the host is ................. The correct option is A. An e-mail address host is the service, organization or the website that provides the e-mail platform. For instance, in the e-mail address: [email protected], the host is google, which facilitates the service.</span>
You might be interested in
Convert 12 bits to bytes​
Genrish500 [490]

Answer:

1.5 bytes

Explanation:

I byte = 8 bit ....

3 0
2 years ago
Victoria has a .... of playing with her hair when she gets nervous​
IrinaK [193]

Answer:

Victoria has a tendency of playing with her hair when she gets nervous.

Explanation:

I believe this is what you are asking for.

:))))

6 0
3 years ago
When creating a report,you can mske groups and subgroups by?​
Mnenie [13.5K]

Answer:

content of the report

Explanation:

  • you must clarify all things
  • the report would be clean and clear
7 0
2 years ago
What is up with the bots? They are so annoying.
Yuki888 [10]

Answer:

very very very annoying

6 0
2 years ago
Read 2 more answers
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
3 years ago
Other questions:
  • The git _____ command will display the last commit and what were the changes you made.
    9·1 answer
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • Question 3 of 10
    7·1 answer
  • Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf
    12·1 answer
  • Which of the following is true of binary files?
    6·2 answers
  • Login
    11·1 answer
  • You Could Never Size Me UP! Been Doing This Sh*t A Long ⏱time
    15·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
  • in Python we use IDE ( lntegrated Dvelopment Environment ) to write down the program data points of difference between script mo
    13·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!