1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
14

What does the proofreading mark "..." mean?

Computers and Technology
2 answers:
natita [175]3 years ago
4 0
Usually the elipsis means leaving out a specific word or phrase from the sentence would allow the sentence to flow better.

People tend to use elipsis to give a “trail off” effect to a sentence or to purposefully not use a specific word due to its symbolism in the text
scZoUnD [109]3 years ago
3 0

Answer:

I believe "..." means that you need to go further in depth with your writing.

You might be interested in
Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
lisabon 2012 [21]

Answer:

It is not possible.

Explanation:

In this example, we need to accommodate 473 computers for six clients that are 473 IP addresses.

For this request just we have /22 IPv4 address blocks, this mean

22 red bits 11111111111111111111110000000000 <--- 10 host bits

We must increase red bits to 25, we need these 3 bits to create 6 sub red, in this case, 2^3 = 8 sub red.

Why did we ask 3 bits? Because if we ask only 2, 2^2 = 4, and we need 6 sub red.

25 red bits 11111111111111111111111110000000 7 host bits

In this case, we need more than 260 computers, but just we have 7 bits, this means.

2^7 = 128 and just one customer needs 260, for that is impossible.

7 0
3 years ago
Unscramble thr words <br>1.Nsieg Wiev<br>2.Seeathdat ievw​
valentinak56 [21]

Answer: genis view       headset view

Explanation:

6 0
2 years ago
Read 2 more answers
____ map a set of alphanumeric characters and special symbols to a sequence of numeric values that a computer can process.
Neporo4naja [7]
The answer is : coding schemes
4 0
2 years ago
Which technology can be implemented as part of an authentication system to verify the identification of employees?
STALIN [3.7K]
The answer is smart card readers. Smart card readers can be implemented as part of an authentication system to verify the identification of employees.
5 0
2 years ago
How to remove duplicates from list in python?
kondaur [170]
<span> the new way of </span>removing duplicates<span> from an iterable while keeping it in the original order </span>
5 0
2 years ago
Read 2 more answers
Other questions:
  • Difference between implicit and explicit type casting
    7·2 answers
  • ​some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.
    14·1 answer
  • When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and
    12·1 answer
  • Select the statements that are true regarding the future of technology. Select 2 options.
    10·2 answers
  • 3 Points
    9·2 answers
  • How are traditional technology and modern technology related to each<br>other? ​
    9·2 answers
  • What is a sign of the brick and mortar and the virtual world meeting together?
    14·1 answer
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • Which of the following statements accurately describes linked data?
    5·1 answer
  • Select the software which is used to convert audio data to text .
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!