1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
15

When a person or organization uses the services of another professional, that person or organization is called the _______

Computers and Technology
1 answer:
klio [65]3 years ago
4 0
When a person or organization uses the services of another professional, that person or organization is called the client. YOUR ANSWER IS CLIENT 
You might be interested in
If a user copies the formula D15 into D16, what would the formula read in D16?
ella [17]
=B16*C16 hope that helped
4 0
3 years ago
Read 2 more answers
Me brown uses a modern technological machine to till his lands and preform task that require high power. This machine has a GDP
tresset_1 [31]

Answer:

you can look it up if you want to just look up modern technological machine  and u will get it.

8 0
3 years ago
Which of the following is a computer procedure that takes raw data and and changes it into information
vesna_86 [32]

Answer

The answer is A

Explanation:

4 0
3 years ago
Read 2 more answers
Match each item with a statement below.â
MakcuM [25]

Answer:

a. Anycast Addresses

b. Broadcast domain

c. Classless Interdomain Routing (CIDR)

d. Extended Unique Identifier (EUI-64) interface ID

e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

f. IP prefix

g. Loopback Address

h. Metric

i. Multicasting

j. Teredo

Explanation:

a. <u>Anycast Addresses</u>: An address type used in IPv6 to allow a one-to-many relationship between source and destination.

b. <u>Broadcast domain</u>: The bounds of a network that defines which devices must receive a packet that's broadcast by any other device.

c. <u>Classless Interdomain Routing (CIDR)</u>: A method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.

d. <u>Extended Unique Identifier (EUI-64) interface ID</u>: An auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.

e. <u>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)</u>: An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.

f. <u>IP prefix</u>: A value used to express how many bits of an IP address are network ID bits.

g. <u>Loopback Address</u>: An address that always refers to the local computer. The loop address is primarily 127.0.01.

h. <u>Metric</u>: A value assigned to the gateway based on the speed of the interface used to access the gateway.

i. <u>Multicasting</u>: A network communication in which a packet is addressed so that more than one destination can receive it

j. <u>Teredo</u>: An automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers.

7 0
2 years ago
Given int variables k and total that have already been declared, use a while loop to compute the sum of the squares of the first
Flura [38]

Answer:

Following are the statement is given below

Int total=0; // variable declaration

int k=1; // variable declaration

while(k<=50) // iterating the loop

{

total=total+k*k; // calculating sum of the squares

k++; // increment the value of k

}

Explanation:

Following are the description of the above statement

  • Declared a variable total and k of int type.
  • Initialized total to 0 and k to 1.
  • iterating the while loop up to the value 50.
  • In this while calculating the calculating sum of the squares in the total variable.
  • increment the value of k by 1. This loop is executed until 50.
7 0
3 years ago
Other questions:
  • Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
    12·1 answer
  • What are the principal cybersecurity threats, both internal and external, and the principal safeguards that have been developed
    13·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • To add or remove space before or after a paragraph, users should select.
    9·2 answers
  • According to the municipal solid waste report what are the benefits of recycling
    6·1 answer
  • Assume that ip has been declared to be a pointer to int and that enrollment has been declared to be an array of 20 elements . As
    13·1 answer
  • This has nothing to do with anything school related, but I'm new to car audio and I was wondering, what happens or what would ha
    13·1 answer
  • i have been looking for like 20 mins now and cant find the answers to test 3 on edhesive. does anybody have an clue to where i c
    12·1 answer
  • Employers are looking for an employee?<br>​
    9·1 answer
  • What is an advantage of using a dynamic hard drive in a vm?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!