1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
12

Why was the IPv6 address format created? Select one:

Computers and Technology
1 answer:
Crazy boy [7]3 years ago
8 0

Answer: D

Explanation:

You might be interested in
LAB: Parsing dates Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1,
Vladimir [108]

The python code which can be used to read dates from input, one date per line and each date's format must be as follows: March 1, 1990, is:

<h3>Python code</h3>

import datetime

inputs = []

result = []

#read the inputs

date = input()

inputs.append(date)

while not date == "-1":

 date = input()

 inputs.append(date)

#check if the input is in the correct format and convert it.

for date_text in inputs:

 try:

   date_text = datetime.datetime.strptime(date_text,"%d %B, %Y")

   result.append(date_text.strftime("%d/%m/%Y"))

 except ValueError:

   pass

   

print(*result, sep = "\n")

The above code would parse the string and extract the date. The split() method was used to break the input into tokens.

Read more about python programming here:

brainly.com/question/27666303

#SPJ1

6 0
2 years ago
In today's classrooms, computers are generally being used to
Vinvika [58]
The answer is enhance traditional instruction. Computers are often used by teachers so that the teachers may have an easier time with their visual aids. Now that we have tools like powerpoint presentations and excel files, it will be easier for the teachers to prepare 
4 0
3 years ago
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
The _______ displays the name of the open file and the program.
Svetlanka [38]
The answer is a. Title Bar

The Title Bar displays the name of the program and the name of the current open file, whether it is just displayed or being edited. It is located at the top of the program window.
3 0
3 years ago
_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat
Mazyrski [523]

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

6 0
3 years ago
Other questions:
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • What is intellectual property?
    13·1 answer
  • The device used to connect a network to the internet is called a
    7·1 answer
  • How can i promote netiquette??​
    10·1 answer
  • You change a document that is saved on your computer by cutting text from the document what happens to the text when you preform
    5·1 answer
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • What did Adam and Eve look like?
    7·2 answers
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • Please help me willgive u brainliest​
    14·1 answer
  • Which item is developed last in the cyclical process?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!