1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
5

Based on image 2 and the description in the article what conclusion can be made ?​

Computers and Technology
1 answer:
MariettaO [177]3 years ago
3 0
You need to post the image
You might be interested in
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
Tomtit [17]

Answer:

Option D) 5

Explanation:

4 subnet bits is 240 mask which provides 2^{4}, i.e., 16 subnets and provides 14 hosts for each.

In order to achieve the target and provide correct subnet mask, 5 subnet bits are required to be borrowed from the host of a classful network address as then the addition of one more subnet bit would result in 248 mask which in turn gives 5 subnet bits which results in 2^{5}, i.e., 32 subnets and 3 host with 6 host per subnet.

7 0
4 years ago
What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
zvonat [6]

Answer:

hypertext

Explanation:

Hypertext is used to describe a computer system that could store literary documents, link them

according to logical relationships, and allow readers to comment and annotate what they read.

Hypertext can also be said to be a system in which text on one page is used to link to text on other pages. They are simply text with links to other text.

Examples of hypertext footnotes, indexes, magazines, newspapers, etc.

A hypertext fiction can be described as an electronic literature with use of hypertext links.

3 0
3 years ago
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
9966 [12]

Answer:

Same Browser

Explanation:

If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.

In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.

In this process all password that are saved on other device may access from any device.

7 0
4 years ago
In this class, it is very common for your computer screen to look like this. What is this?​
Vsevolod [243]
Theres no Picture???
8 0
3 years ago
Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
Paha777 [63]
<span>Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: Malicious code
Malicious code is often created to steal some information from another user without they realizing it, such as address, credit card number, social security number, email password, etc.</span>
4 0
3 years ago
Other questions:
  • What is one important feature of an aup? 1. a list of all available courses. 2. a clear out line of the consequences of violatin
    12·2 answers
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • What is the difference between Google and a subject directory like Yahoo Directory or Infomine?
    14·2 answers
  • What weight pencil is recommended for darkening lines and for lettering? *
    7·2 answers
  • Question 2 (2 points)
    6·1 answer
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • Write a SELECT statement that uses an aggregate window function to get the total amount of each order. Return these columns: The
    13·1 answer
  • A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
    15·1 answer
  • A _____ is a computer that is deliberately set up to be easily hacked into.
    10·1 answer
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!