1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
10

Select the answer that best describes the ethical guideline followed in each scenario.

Computers and Technology
1 answer:
Montano1993 [528]3 years ago
4 0
We need the scenario to solve this feel free to comment on this with your so scenarios and I will provide you with answers or just post another question
You might be interested in
In this chapter, you subnetted a Class C private network into six subnets. In this project, you work with a Class B private netw
defon

Answer:

1. 10 bits

2. 1022 Hosts / Subnet

Explanation:

Given Network ID is 172.20.0.0

Class B network contains :

Network ID = 16 bits

Host ID = 16 bits

For subnetting always host id bits are used.

Number of subnets required = 50. Subnets are always in power of two. Nearest power of two to 50 is 26 = 64.

So, to create subnet we require 6 bits from host id and 64 subnets can be created with those 6 bits.

1)

Number of host bits needed for new subnets for network information = 6 bits.

Therefore, New network information contains :

Network ID of subnet = 16 + 6 = 22 bits

Host ID = 16- 6 = 10 bits.

2)

Subnets required = 50

Subnets created with 6 bits = 64.

Number of subnets unused for future expansion = 64 - 50 = 14 subnets.

Host ID part contains 10 bits. Therefore, Total number of Hosts /Subnet = 210 = 1024 Hosts.

Number of usable hosts per subnet = 1024 -2 = 1022 Hosts / Subnet.

7 0
3 years ago
What is a . com in a web address mean<br>​
geniusboy [140]

Answer:

dot commercial

Explanation:

.edu education

.gov goverment

4 0
3 years ago
Read 2 more answers
Which fonts do not have a practical use in writing
kondaur [170]
To be honest with you, I don’t know but you can always look up on google “which fonts do not have a practical use in writing” and then there are links you can look up for the answer . Sorry but I don’t know which link is the best answer for your question ;) have a great day bro
8 0
3 years ago
create your own min function that finds the minimum element in a list and use it in a separate function
schepotkina [342]

Answer:

def minfunction(mylist):

   min = mylist[0]

   for i in mylist:

       if i < min:

           min = i

   print("The minimum is: "+str(min))

   

def anotherfunction():

   mylist = []

   n = int(input("Length of list: "))

   for i in range(n):

       listelement = int(input(": "))

       mylist.append(listelement)

   minfunction(mylist)

   

anotherfunction()

Explanation:

This solution is implemented in Python

This defines the min function

def minfunction(mylist):

This initializes the minimum element to the first index element

   min = mylist[0]

This iterates through the list

   for i in mylist:

This checks for the minimum

       if i < min:

... and assigns the minimum to variable min

           min = i

This prints the minimum element

   print("The minimum is: "+str(min))

   

This defines a separate function. This  separate function is used to input items into the list

def anotherfunction():

This defines an empty list

   mylist = []

This prompts user for length of list

   n = int(input("Length of list: "))

The following iteration inputs elements into the list

<em>    for i in range(n):</em>

<em>        listelement = int(input(": "))</em>

<em>        mylist.append(listelement)</em>

This calls the minimum function

   minfunction(mylist)

   

The main starts here and this calls the separate function

anotherfunction()

5 0
3 years ago
A computer with 5 stage pipeline like the one descrive in class delas with conditional branches by stalling for the next three c
trasher [3.6K]

Answer:

It hurts 80%

Explanation:

7 0
4 years ago
Other questions:
  • 3.A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 9
    11·1 answer
  • Ethics in businesses and organizations are made up of a set of moral principles that guide the organizations. Discuss how good w
    8·1 answer
  • Do URLs identify the location of Web content?
    8·2 answers
  • Network address translation is useful because it enables
    5·1 answer
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • In your own words describe the benefits of creating functions in your code
    12·1 answer
  • What is the most common representation of a distribution?
    14·1 answer
  • Jeni is using the Label Wizard to solve a problem. What problem was she most likely experiencing?
    13·1 answer
  • What is a zerø-day exploit? No go.ogle &gt;:(
    10·1 answer
  • Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!