1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
2 years ago
7

In your opinion, why did Proponentsof IPs used IPV6 instead of IPv5​

Computers and Technology
1 answer:
frutty [35]2 years ago
5 0

Answer:

The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.

Explanation:

Solution:

The following reasons why Proponents  of IPs used IPV6 instead of IPv5​ is stated as follows:

  • Due to its limited 32 bit addressing
  • IPv6 offers almost unlimited addressing because of its 128-bit addressing
  • IPv5 started under a different name which is internet stream(ST)
  • ST(Internet streaming) was developed for streaming video and voice
  • ST was developed by Apple, NeXT, and Sun Microsystems
  • ST was effective on specific frequency to carry out communication
You might be interested in
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
What is printed by the following program? var numApples = 10; var numOranges = 5; if(numApples &lt; 20 || numOranges == numApple
Travka [436]

Answer:

The output of the following code is "Hello, we are open! Sincerely, the grocery store ".

Explanation:

In the given code firstly we declare the variable that is numApples and numOranges. In this variable we assign value and the datatype of the variable is var. The var datatype can hold any type of data. Then we use the conditional statement. In the conditional statement, we use the OR logical operator. In the if block we check the condition that is if numApples variable value is less then 20 OR numOranges variable value is equal to numApples then it will print "Hello, we are open!". In the else block it will print "Sorry, we are closed!". In the last, we print "Sincerely, the grocery store".So in this question, if block is executed and the additional message is printed.

6 0
3 years ago
Write a regular expression pattern that matches strings representing trains. A single letter stands for each kind of car in a tr
MAVERICK [17]

Answer:

See explaination

Explanation:

import re

def isValidTrain(train):

pattern = r'^E+(((P|PP|PPP|PPPP)D)*(BB)*)*C$'

if re.match(pattern, train):

return True

return False

def checkAndPrintTrain(train):

print("Train", train, "is valid:", isValidTrain(train))

checkAndPrintTrain("EC")

checkAndPrintTrain("EEEPPDBBPDBBBBC")

checkAndPrintTrain("EEBB")

checkAndPrintTrain("EBBBC")

checkAndPrintTrain("EEPPPPPPDBBC")

checkAndPrintTrain("EEPPBBC")

checkAndPrintTrain("EEBBDC")

Sample output

Train EC is valid: True

Train EEEPPDBBPDBBBBC is valid: True

Train EEBB is valid: False

Train EBBBC is valid: False

Train EEPPPPPPDBBC is valid: False

Train EEPPBBC is valid: False

Train EEBBDC is valid: False

6 0
3 years ago
Assume your computer clock runs at the speed of 2.5 GHz (G=10^9).
azamat

Answer:

a) T=4*10^{-4}μs

b) N=2.5*10^6 cycles

c) 10000 programs.

Explanation:

a) We know that the frequency is the inverse of the period, so:

f=\frac{1}{T}\\\\T=\frac{1}{f}\\T=4*10^{-10}s

1μs is equal to 1*10^{-6}s

so T=4*10^{-4}us

b) If in a second there are 2.5*10^9 cycles:

N=2.5*10^9*(1*10^{-3})=2.5*10^6 cycles

c) we have to make a conversion, we know that a program takes 100*10^(-3) milliseconds, that is, 1*10^(-4) seconds so in 1 second we can execute:

P=\frac{1s}{1*10^{-4}s}=10000

10000 programs.

7 0
3 years ago
Other questions:
  • If you wanted to only view the sales of $200,000+ in the table above, which number filter would you select?
    7·1 answer
  • ________is one color shade gradually progressing to another shade of the same color or one color progressing to another color.
    14·1 answer
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • Displays are geared for a specific resolution. what is this resolution called?
    15·1 answer
  • Select the correct answer.
    10·1 answer
  • Which of the following is a type of input device?
    5·1 answer
  • 2. Which of the following is a shortcut key to Exit from any operation?
    10·2 answers
  • What does the following process describe?
    10·1 answer
  • I need help with this question.
    15·1 answer
  • Explain the role of computers in accounting
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!