1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
12

The hexadecimal number system uses alphabets A to F to represent values_ to _

Computers and Technology
2 answers:
Naily [24]3 years ago
8 0
They represent 10 to 15
mash [69]3 years ago
7 0

Answer:

they represent values 10 to 15

You might be interested in
Which of the following statements about meta tags is TRUE?
Iteru [2.4K]

Answer:

I guess c no. is the answer

6 0
3 years ago
Read 2 more answers
A search engine is giving you too many sites that are not relevant to your topic, how cell phones change culture. Placing quotes
Pie

Answer:

All of the above.

Explanation:

Regards: Your Friendly Study Co-Pilot!

5 0
3 years ago
Read 2 more answers
Understanding that protection of sensitive unclassified information is:
AfilCa [17]

Answer:

Not necessarily malignant

Explanation:

As the word "unclassified" shows it's not damaging, however I still doesn't recommend if it's not necessary.

4 0
3 years ago
Whats your fav subject
kykrilka [37]

Answer:

Computers

Explanation:

Thats why I'm looking thru new on this subject

4 0
3 years ago
Read 2 more answers
ICMP
sp2606 [1]

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are <em>echo request</em> and <em>echo reply.</em>

<em />

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as <em>Time Exceeded</em>) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP <em>echo request </em>packets to the host and then waits for an ICMP <em>echo reply</em> from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

6 0
3 years ago
Other questions:
  • What can web designers use to control the individual web page layouts for all of the pages on a website?
    7·1 answer
  • Considering the following algorithm, which of the following requirements are satisfied?
    9·1 answer
  • The class at the top of exception class hierarchy is ..........................
    12·1 answer
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • Which of the following topics should you avoid bringing up during a college interview?
    10·2 answers
  • The REPE prefix does which of the following ?a. Repeats an instruction while the zero flag is clearb. Repeats an instruction whi
    13·2 answers
  • Henry conducted a survey on an ad done by his company. In the survey, he asked people to evaluate the ad and state whether they
    8·1 answer
  • What is the purpose of a system call in an operating system?
    10·1 answer
  • The movie polar express was critically acclaimed due to the unbelievably lifelike movements of Tom Hanks character
    13·1 answer
  • PLS HURRY<br> Look at the image below
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!