1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
14

In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?

Computers and Technology
1 answer:
azamat3 years ago
8 0

Answer: d) Network

Explanation: IPv4(internet protocol version 4) is the decimal-digit numeric value  for the internet protocol.It helps in the identification of the hosts  through logical addresses. The functioning of  IPv4 helps in the routing of the information over the network.

The network layer contains router that is responsible for the routing of message between the nodes of the path.Router functions with internet protocol.Other options are incorrect because protocol is the set of riles,data link layer works for managing the movement of data and  transport layer monitors the transmission of data.Thus ,correct option is option(d)

You might be interested in
Compute the sum of the values in data_array, instead of using the sum() function. To do this, you must "accumulate" a result, wh
Dmitry [639]

Answer:

public class TestClock {

   public static void main(String[] args) {

       int [] data_array = {1,2,3,5,3,1,2,4,5,6,7,5,4,3};

       int data_array_sum =0;

       for(int i=0; i<data_array.length; i++){

           data_array_sum = data_array_sum + data_array[i];

           System.out.println("Acumulating sum is "+data_array_sum);

       }

       System.out.println("Total sum is: "+data_array_sum);

   }

}

Explanation:

Using Java programming language for this problem, we declare and initialize the array with this statement:

int [] data_array = {1,2,3,5,3,1,2,4,5,6,7,5,4,3};

Then created a variable to hold the sum values and initialize to zero:

int data_array_sum =0;

Using a For Loop statement we iterate through the array and sum up the values.

8 0
4 years ago
HELPPP ME PLEASEEE!!
natita [175]
It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.
4 0
3 years ago
In the late 1990s, Microsoft was sued for "tying" its Internet browser, Internet Explorer, to its operating system. A seller for
LekaFEV [45]

Answer:

Section 3 of the Clayton act.

Explanation:

Section 3 of the Clayton act 15 U.S.C.S § 14, makes illegal some kind of distribution practice that facilitates monopolistic arrangement that is section 3 of the Clayton act makes it illegal to enter into tying arrangement, exclusive dealing contracts or requirement contracts if such contracts tends to lessen competition. Where customer is required to pay for an undesired product in order to obtain a desired product.

3 0
3 years ago
What rules should we have about cell phone
scZoUnD [109]

Introduction: There are many rules schools should follow when it comes to cell phone use during school hours. Technology can be very distracting and durning school is when kids need to pay attention. Most people see cell phone rules un fair or bad, however it's not like that. The school just wants what's best for the students and so they can learn, which will ultimately help them on later in life.

Body paragraphs (wont write the rest of the paragraphs but heres some ideas) Only using the phone when needed like if it's an emergency, phones have to stay on silent to not disrupt others, during free period you can choose whether to be on your phone

then you write your conclusion based on what you wrote

7 0
2 years ago
Read 2 more answers
Previously, our password was 8 characters and included only lower-case letters. Now, because of changing requirements, we genera
BARSIC [14]

Answer:

7 characters.

Explanation:

Here we have 26(small letters)+26(capital letters)+10(number from 0-9)=62

As we are having more number of possibilities for each character of the password, We will need a smaller length to reach the same or better level of security.

If we take 6 characters long password we will have 626 = 56,800,235,584‬ possibilities, which is less secure than the previous 8 characters long password.

But if we take 7 characters long password we will have 627 = 3,521,614,606,208 possibilities, which is almost 17 times larger than the previous password and has a smaller length when compared to the previous password.

3 0
3 years ago
Other questions:
  • Which of these is an effective color scheme?
    14·1 answer
  • Which file extension indicates a Microsoft Excel document?
    7·1 answer
  • What is the formula that calculates the session fee for members in excel
    13·1 answer
  • What is wrong with the following code? How should it be fixed?
    12·1 answer
  • You can run a macro by:
    10·1 answer
  • Dividing a hard drive into multiple sections is known as partitioning
    5·1 answer
  • Q.drtrdyudoijoemrkdf
    6·2 answers
  • Create a multimedia project that contains the text element and all the contents that you have studied about that element
    13·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!