1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
12

Dotted Decimal Notation was created to______________. Group of answer choices provide an alternative to IP addressing express ea

ch eight bit section of the 32-bit number as a decimal value provide a more convenient notation for humans to understand both a and b both b and c both a and c
Computers and Technology
1 answer:
BaLLatris [955]3 years ago
3 0

Answer:

Both b and c

Explanation:

Dotted Decimal notation is a presentation of numerical data which is expressed as decimal numbers separated by full stops. Dotted decimal notation expresses each eight bit sections of 32 bit numbers as decimal value. It provides convenient notation which is easy to understand by the people who are IT experts.

You might be interested in
If Tamya makes $1000.00 gross monthly income and her total payroll deductions are $294.00, what is her net income?
Maru [420]

Answer:

$751

Explanation:

From the question we have the following information;

Gross income = $1000.00

Deductions =   $294.00

Now we know that;

Net income = Gross income - Deductions

Therefore;

Net income = $1000.00 -  $294.00

Net income = $751

7 0
3 years ago
Which game title went on to become the highest selling unbundled cartridge game?
alexandr402 [8]

Answer:

Tetris

Explanation:

On June 6, 1984, the first version of Tetris was unveiled and quickly took the world by storm. While Tetris has appeared on every major gaming platform from the Commodore 64 to the iPhone, it arguably gained its greatest notoriety as the cartridge game bundled with the original Nintendo Game Boy.

5 0
2 years ago
What are the six peripherals of a computer system
Lubov Fominskaja [6]
Peripherals fall into three categories:
1. input devices are devices that put commands inside computers such as keyboards, mouses, and joysticks but the first two are the mostly used nowadays
2. output devices are what computers give out such as monitors, printers, speakers and I think projectors also fall into that category
3.storage devices such as a optical drive, hard drive, SDD, flash drive
So the main ones might be a mouse, keyboard, monitors, I think printers, hard drives and flash drives but speakers might be considered as one instead of a flash drive.

4 0
3 years ago
This is due in like an hour but I'm confused so please do lend assistance
blagie [28]
Yes you do have to program it first.
4 0
3 years ago
To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the t
nevsk [136]

Answer:

Jumbo frames

Explanation:

Ethernet frames having a payload size above 1500 bytes are called Jumbo frames. The maximum MTU value set by the IEEE 802.3 is 1500 bytes, but jumbo frames have sizes up to a maximum of 9000 bytes, hence they do not meet the standards of IEEE 802.3. They are used in local area networks that can transmit data at high rates of 1 gigabits per second.

6 0
3 years ago
Other questions:
  • Give a recursive algorithm for finding the sum of the<br> first n odd positive integers.
    8·1 answer
  • There was a thunderstorm in your area and the power is out. The traffic lights are not functioning. Explain what you should do w
    8·2 answers
  • When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again?
    11·1 answer
  • Which type of disk uses primary partitions, extended partitions, and logical drives to organize data?
    9·1 answer
  • Describe the difference between a myth and a fable.
    12·1 answer
  • Is megan the stallion hot
    13·2 answers
  • You have many drugs that you want to store electronically along with their purchase dates and prices, what kind of software woul
    7·1 answer
  • It is usually simple to delete old posts and online conversations if they make you look bad.
    5·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
  • the term elastic in ec2 refers to the fact that you can easily increase or decrease the number of servers you run to support an
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!