1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
10

Unspecified a. typical IPv6 prefix used to indicate the network portion of the address. /64 b. IPv6 address represented as ::/12

8 (compressed form) and cannot be assigned to an interface Unique local c. Unique, internet-routable IPv6 address (dynamic or static) Loopback d. Used to communicate with other devices only on the same IPv6 subnet.

Computers and Technology
1 answer:
Aleks [24]3 years ago
6 0

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given statements there are some mistype errors so, in the explanation section, we define the question with their suitable answer.

In choice A:

The Internet Protocol version 6 (IPv6) Prefix Length is being used to identify however many bits are already in the network part of its Global Unicast IPv6 address. It uses the number 64 for employed to recognize the network part of the very first 64 bits, that's why in Option A answer is "/64".

In choice B:

An IP address is used to represent 8 classes, in which each representing 16 bits, in the representation IP address it uses:: that is unspecified, that's why in Option B answer is "Unspecified".

In choice C:

The global unicast is a single connection on each sender and receiver, it specified from each network address, through one position upon its network to the other, that's why in Option C answer is "global unicast".

In choice D:

The link-local is used to communicate with other devices with the same IPv6 subnet, that's why in Option D answer is "link-local".

Please find the attachment of the question:

You might be interested in
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
Zarrin [17]

Answer:

Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred and indistinct, as companies that compete one day may be partners the next. So "Lines" cannot be compared to/with internet companies.

Explanation:

The Internet Industry  is shaped by its unique framework outlining and its own rules between the companies within it, which offer a vast number of products and services and not always competing with each other compared with the traditional established industries competition lines that were developed from two parties or more aiming the same unshareable goal. These industries are stablishing the lines of competitions predicament which by all means can not be measured and applied using the same criteria for both of them.

The online industry is claiming for flexible, pliant lines of competition to be inforced to its specific logic and mechanisms.

The companies are now in a brand new competing ground with the digital area, so traditional established bart lines of competition although clear and defined are becoming obsolete facing the current surprising thus blurred and indistict internet industry lines.

6 0
3 years ago
2.<br> Fill in the blanks:<br> a) Software is a set of computer program
scoray [572]

Answer:

Software is a set of computer programs which makes computer work.

4 0
3 years ago
Question # 9
Ganezh [65]

Answer:

flight stimulators are used to train astronaut and design simple air craft

8 0
2 years ago
Before u can open and edit a file, you need to zip it, T/F
koban [17]

Answer

False, it is not necessary that you need to zip a file always when you are opening and editing a file

<u><em>PLS MARK BRAINLIEST</em></u>

5 0
3 years ago
Other questions:
  • Which character must decide whether to support the assassins or avenge his friend's death?
    14·2 answers
  • The ____________ is the number of rectangles an image has in a square inch.
    11·2 answers
  • Does anyone have any social media message me
    14·1 answer
  • A file must be ________ before data can be written to or read from it. closed opened buffered initialized none of these
    11·2 answers
  • You find that you are missing a very important file. After much searching, you have determined that it is no longer on your comp
    13·2 answers
  • Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
    15·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • You will use the Word application to design, develop, and create a business letter to potential clients of your new business. Th
    15·1 answer
  • What are some positive and nevative aspects of technology?
    11·1 answer
  • Which of the following formats can algorithms NOT be written in:
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!