1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
3 years ago
6

For BitTorrent, which of the following is true:

Computers and Technology
1 answer:
Bumek [7]3 years ago
8 0

Answer:

d. All of the above

Explanation:

All the above mentioned statements are true about BitTorrent.

You might be interested in
ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the sta
andreyandreev [35.5K]

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

4 0
3 years ago
How often should you typically monitor your checking account?
alex41 [277]
It usually<span> takes three months for </span>your<span> budget to begin working well. ... When </span>you<span> use credit cards, the money is </span>much<span> easier to keep </span>track<span> of, </span>
5 0
3 years ago
What according to you a good software design?
tamaranim1 [39]

Answer:  As software design is the part of Software development cycle (SDLC) it requires many factors to be become good and helpful such as:-

  • As it is a designing process it requires a update in the pattern and design so it should be able to deal with every change or update in the software that is being made.
  • Software design should be able to support any modification in the design whenever it is required.
  • By supporting the modification and updates in the design it makes it easy to save the time as well . So, it is also required that is should be a time saving process.

4 0
3 years ago
Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive th
Lana71 [14]

Answer:

The file and printer sharing (Echo Request - ICMPv4-In) rule option should be listed for all profile.

Explanation:

The main reason why it is not compulsory or obligatory to design an inbound rule on the internal 192.168.12.10 Windows server in other to be able to accept the response (ICMP echo reply) generated from the internal 192.168.12.11 Windows server is that the file and printer sharing (Echo Request - ICMPv4-In) rule option or alternative needed to be listed for all profile.

Inbound rules filter or sieve traffic advancing from the network to the local computer based on the filtering conditions set out in the rule.

5 0
3 years ago
Which of the following is based on the visibility and location of an object’s features?
grandymaker [24]

Answer:

The answer is Lines.

Explanation:

A visible line, or object line is a thick continuous line, used to outline the visible edges or contours of an object. A hidden line, also known as a hidden object line is a medium weight line, made of short dashes about 1/8” long with 1/16”gaps, to show edges, surfaces and corners which cannot be seen.

7 0
3 years ago
Other questions:
  • An outdoor products company wants to test a new website design where customers can get information about their favorite outdoor
    6·1 answer
  • Which tab is used to configure an export to PST in Outlook 2016?
    7·2 answers
  • Explain Software licensing
    12·1 answer
  • which is the quickest way to change the font color in multiple, randomly located cells in a worksheet?
    6·2 answers
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • Describe the following types of Cloud services:
    11·1 answer
  • Which alignment aligns text to the left and right side margins?
    15·1 answer
  • HI! THIS IS THE PERSON FROM EARLIER WHO HAD PROBLEMS WITH THEIR PASSWORD
    8·1 answer
  • Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that som
    14·1 answer
  • True or false: Securing intellectual property digitally is the only security because that's how all IP is stored.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!