1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
15

Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported

on the Internet? How many unique addresses would be there ?
A. 4
B. 8
C. 16
D. 32
Computers and Technology
1 answer:
Allushta [10]3 years ago
8 0
C. is the answer my guy
You might be interested in
Which of the following is a technology designed for use in manufacturing?
Alenkasestr [34]

Answer:

B) machine-to-machine (M2M) communications

Explanation:

Manufacturing technology refers to the technological advancement that enables the production of the tools that further helps in the manufacturing of the other goods. The quality, quantity, and production are enhanced with these manufacturing technologies. Machine-to-machine communications are designed for manufacturing technologies. In this technology, the information and data can be easily transferred from one device to another either by the help of wires or without wires.

4 0
4 years ago
NWhen you measure a person’s weight, you are measuring the
MAVERICK [17]

Answer:

gravitational force acting on that person.

Explanation:

5 0
3 years ago
Read 2 more answers
Which feature does the web designer fail to apply in this layout for a web page? A. harmony
iogann1982 [59]
The answer is D.balance
3 0
3 years ago
Read 2 more answers
List 2 positive impacts of cybersecurity.
kupik [55]

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

7 0
3 years ago
Read 2 more answers
Can you help me with these AP Computer Science Questions. (THIS IS DUE BY 1:30 PM today) you have to evaluate the Boolean Expres
vfiekz [6]

Answer + Explanation:

'and' -> both statements are 'True' to evaluate as 'True'.

'or' -> at least one statement is 'True' to evaluate as 'True'.

1. True (grade has the value of 82, so the statement evaluates to 'True').

2. True (Both statements are true, this expression evaluates to 'True').

3. False (Both statements are false, this expression evaluates to 'False').

4. True (the != operator means <em>not equal.</em> Since the 'name' variable holds the string 'Rumpelstiltskin', name != 'Rumpelstiltskin' evaluates to 'False'. The 'not' operator returns the opposite of the given Boolean expression, so this expression evaluates to 'True').

5. True (name == 'Rumpelstiltskin' evaluates to 'True', so this expression is true).

6. False (All statements evaluate to 'False').

7. True (All statements evaluate to 'True').

8. False (All statements evaluate to 'True' except for <em>not(x == - 3) </em>which evaluates to 'False', so the whole statement now becomes false).

9. True (<em>grade+5 < 90 and grade >= 80 </em>evaluates to 'True', so this whole expression becomes true).

10. True (<em>grade > 0 and x % 2 == 1 </em>evaluates to 'True')

Hope this helps :)

7 0
3 years ago
Other questions:
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
    12·2 answers
  • Where are the Add Level and Delete Level buttons located? Filter options list Sort &amp; Filter group Sort dialog box Custom fil
    11·1 answer
  • Which of the following is NOT a MySQL table storage engine?
    6·1 answer
  • What are some areas to fill out in the New Formatting Rule dialog box? Check all that apply.
    13·2 answers
  • The proxy statement issued by a corporation is a requirement of: a. The Securities &amp; Exchange Commission (SEC) b. The Financ
    5·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
  • What happens when i expose a disk to magnetic fields?​
    5·1 answer
  • Write a script that inputs a line of encrypted text and a distance value and outputs plaintext using a Caesar cipher. The script
    11·1 answer
  • HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!