1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
12

Dynamic addressing: __________.

Computers and Technology
2 answers:
vivado [14]3 years ago
7 0
E. can solve many updating headaches for network managers who have large, growing, changing networks
Anarel [89]3 years ago
6 0

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

You might be interested in
Arrange the types of movies in terms of the amount of content they can hold
posledela

Answer:

Well here is what I got...

Explanation:

Action

Crime

Fantasy

Horror

Romance

Science Fiction

Slice of Life

Sports

Thriller

War

Western

8 0
3 years ago
¿en minimo cuantos computadores se puede construir una red,y en maximos en cuanto y que se necesita para que este en la red?​
stira [4]

Answer:

me no speak taco bell

Explanation:

3 0
3 years ago
What is a hash function? A. A function that computes the location of the values in the array B. A function has allocated memory
galina1969 [7]

Answer:

A hash function is a function which when given a key, generates an address in the table. The example of a hash function is a book call number. Each book in the library has a unique call number. ... The later is always possible only if you know (or approximate) the number of objects to be proccessed.

Explanation:

A

3 0
3 years ago
Read 2 more answers
What two solutions address lack of human access to clean water
Marina86 [1]

Answer:

THREE strategies which local municipality is implementing in addressing the issue of lack of clean water caused by human factors include:

1) Increasing the amount of tax for those companies which are opening their wastes into water sources which can help built better water cleaning and recycle system.

2) Tree plantation is another strategy to help secure the water sources and naturally keep cleaning it.

3) Running awareness campaigns for general people to keep the water sources clean as well as use the only amount of water which they need and not waste it.

Explanation:

i hope this helps you

5 0
3 years ago
A function named function1 is defined in a module named module1. Suppose function1 has no parameter. Which of the following Pyth
Oduvanchick [21]

Answer:

Option C i.e., both A and B is the correct option to the following question.

Explanation:

Because in the following statement which is for the Python Programming Language, they can define the function i.e., "function1" without any argument and they can call that function with the help of another module then, they can call that function by using both methods. So that's why the following option is correct.

7 0
3 years ago
Other questions:
  • What is an incremental backup?
    7·1 answer
  • 12. In Microsoft Word, when you highlight existing text you want to replace, you are in A. basic mode. B. automatic mode. C. ins
    10·2 answers
  • Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
    9·1 answer
  • What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
    12·1 answer
  • Write a C++ program that produces a simple personalized adventure game called Lost Fortune about a band of explorers that finds
    12·1 answer
  • When you open your word-processing program, it opens in a<br> field<br> menu
    9·2 answers
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character
    15·1 answer
  • Why key logger are essential for computer system
    14·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!