1answer.
Меню
Ask question
Login
Signup
Ask question
Menu
All categories
English
Mathematics
Social Studies
Business
History
Health
Geography
Biology
Physics
Chemistry
Computers and Technology
Arts
World Languages
Spanish
French
German
Advanced Placement (AP)
SAT
Medicine
Law
Engineering
aev
[14]
3 years ago
12
Why does the IPv6 format use letters and numbers?
Computers and Technology
Answer
Comment
Send
1
answer:
Iteru
[2.4K]
3 years ago
7
0
Answer:
c is the response hope it helps
Send
You might be interested in
Which is NOT true?<br> 9 + 4 = 17 - 4<br> 8 + 7 = 14 + 3<br> 11 = 19 - 8<br> 5 + 8 = 20 - 7
Fudgin [204]
Answer:
B 8 + 7 = 14 + 3
Explanation:
7
0
2 years ago
4. True or False? Electrons flow out from the POSITIVE end of a battery. *<br> True<br> False
lana66690 [7]
False electrons put off a negative charge
4
0
3 years ago
Petra has an interview with an IT company. What technique can help prepare her?
SVEN [57.7K]
I would go C because that way it gets her prepared to answer any techie questions they would have for her and would make her a better option.
3
0
3 years ago
Read 2 more answers
You should always buy the biggest camera bag that you can find for extra equipment.
Akimi4 [234]
Answer:
true
Explanation:
7
0
3 years ago
Read 2 more answers
Can someone please do a java computer science program for me? I’m desperate and I did not have enough time to learn the topic. I
vagabundo [1.1K]
Sure, how would you like me to send you the code?
5
0
3 years ago
Other questions:
All of the following are vertical alignment options except __middle , top, center, or_bottom_.
12
·
1 answer
Why is it important to evaluate the website on which you plan to shop?
7
·
2 answers
2. What is a cap? (0.5 points)
9
·
1 answer
relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
9
·
1 answer
If all the data in a database is not physically located in one place, it would be a(n _______ database.
5
·
1 answer
LAB: Convert to binary - methods
11
·
1 answer
how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
10
·
1 answer
What is the theory of relativity? How does it relate to the creation of electricity through solar energy?
12
·
1 answer
Data type can only be true or false <br><br> Answer: Bool
15
·
1 answer
The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
10
·
1 answer
×
Add answer
Send
×
Login
E-mail
Password
Remember me
Login
Not registered?
Fast signup
×
Signup
Your nickname
E-mail
Password
Signup
close
Login
Signup
Ask question!