1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
10

Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? Group of a

nswer choices 10.10.1.1 234.1.1.1 168.16.1.1 172.30.1.1
Computers and Technology
1 answer:
VladimirAG [237]3 years ago
7 0

Answer:

168.16.1.1 is correct.

Explanation:

168.16.1.1 is the legitimate Internet Protocol address that can be used on the Internet.

Internet Protocol 10.10.1.1 and internet Protocol 172.30.1.1 are the private internet protocol addresses so they could not be used on the internet.

The Internet Protocol 234.1.1.1 has been used as a multicast address so they may not be used on the Internet.

You might be interested in
Diane wants to maintain a record of grades she scored in the fifth, sixth, and seventh grades. She enters her grades and the tot
sammy [17]
The answer of the given question above would be the second option: NUMBERS. Based on the given scenario above about Diane who wants to maintain a record of grades she scored in the fifth, sixth, and seventh grades and enters  her grades and the total percentage she scored in a spreadsheet, the tab o<span>n the Format Cells dialog box that will enable her to display the total percentage symbol in the spreadsheet would be the Numbers. Hope this helps.</span>
6 0
3 years ago
Read 2 more answers
It is a good practice to use 3d to plot a single dimensional data in storytelling.
Brums [2.3K]

Answer:

The answer is "Option B".

Explanation:

The 3-dimensional diagrams also known as a 3D graph, it implies to 3D design, which Occasionally receives the 2D data, which effects 3D and It is a terrible form.

  • The whole additional dimension comes to an end but never more than inserting a chart or its readability could be dramatically affected.
  • It uses the 3D to create a single dimension, but the information is not a great training.
6 0
3 years ago
A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP)
umka2103 [35]

Answer:

D. Sequence number

Explanation:

The sequence number facilitates the keeping track of many segments. This enables it to determine which segments out of many in which it should be in. The sequence number field is usually 32 bits.

Sequence numbers are used in transmitting data because of their importance. Since data is transmitted in packets, they can be lost and as such the receiver uses the sequence numbers to reorder them.

6 0
3 years ago
What is the maximum number of elements that will be visited by the binary search algorithm when searching a sorted 45-element ar
sergey [27]

The max nukber of elements visited will be 6.

6 0
2 years ago
Thelma is a web developer for a bowling league. She wants visitors to the website to be able to print web pages, such as league
prohojiy [21]

Answer:

"@page" is the correct answer for the above question.

Explanation:

  • "@page" is a syntax of CSS which will affect that page which is converted from the hard copy from the soft copy. It means it affects the page which will render the output.
  • So If the Thelma wants to set the margins on the output page then he can do this by the help of the "@page" tag which is defined in the CSS, and then the margin is set to this tag by the help of margin statement.
8 0
3 years ago
Other questions:
  • A word or line of a paragraph at the top of a page hanging indent is called ______
    8·1 answer
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • In order to plan George's birthday, his father gave him a list of people who attended his birthday for the last five years. What
    5·1 answer
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
    13·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    9·1 answer
  • 3.5 Code Practice: Question 1<br> (Website: Edhesive)
    14·1 answer
  • Which is the first computer brought in nepal for the census of 2028 B.S​
    6·1 answer
  • Please help me.
    8·2 answers
  • Give a brief explanation about the internet.plsssss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!