1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
12

PLEASE GO SUPPORT I JUST STARTED 3 WEEKS AGO AND I GET NO VIEWS

Computers and Technology
2 answers:
Margarita [4]3 years ago
8 0

Answer:

Subbed  :)

Explanation:

MrRissso [65]3 years ago
6 0

Answer:

thanks for the free points il try and subscribe

Explanation:

You might be interested in
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
zalisa [80]

Answer:

A

Explanation:

The internet protocols are changed every year to adapt to the new devices that have been connected to the network. Back in the 1990s, most traffic used a few protocols.  Pv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.

For many years, there were negligible changes to these core Internet protocols; HTTP added a few new headers and methods, TLS slowly went through minor revisions, TCP adapted congestion control, and DNS introduced features like DNSSEC. The protocols themselves looked about the same ‘on the wire’ for a very long time (excepting IPv6, which already gets its fair amount of attention in the network operator community.)

As a result, network operators, vendors, and policymakers that want to understand (and sometimes, control) the Internet have adopted a number of practices based upon these protocols’ wire ‘footprint’ — whether intended to debug issues, improve quality of service, or impose policy.

Now, significant changes to the core Internet protocols are underway. While they are intended to be compatible with the Internet at large (since they won’t get adoption otherwise), they might be disruptive to those who have taken liberties with undocumented aspects of protocols or made an assumption that things won’t change.

8 0
4 years ago
Read 2 more answers
"You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can
SSSSS [86.1K]

Answer:

6 hosts can have IP addresses on the LAN attached to the router interface

Explanation:

Given IP address

=> 192.168.192.10/29

It has a subnet mask of /29 which means it has 3 host bits. This is calculated by subtracting 29 from 32(number of bits in an IPV4)

Since there are 3 host bits,  the total number of possible addresses is given by

=> 2^{3} = 8 possible addresses.

Out of these 8 possible addresses, the first address will be the subnet id and the last address will be the broadcast address.

Therefore, there are only 6 addresses available for the hosts.

<em>Hope this helps!</em>

5 0
3 years ago
Which wireless communication is typically limited to six feet of distance?
Anni [7]

Answer:

nfc

Explanation:

8 0
4 years ago
A large multinational client has requested a design for a multi-region database. The master database will be in the EU (Frankfur
12345 [234]

Answer:

RDS with cross-region Read Replicas

Explanation:

The Amazon Web Service, popularly known as the AWS is a subsidiary company of the Amazon.com which provides various cloud computing platforms on demand and Application Programming Interface or the API to other companies, governments and individuals.

The Amazon web services provides an effective RDS. RDS stands for Relational Database Service. The Amazon RDS is used to set up as well as operate and scale relational database in cloud. It provides resizable capacity and cost effective database.

In the context, Amazon Wen Services  can deliver RDS with cross regional Read Replicas.

4 0
3 years ago
What is the best way to describe the relationship between two companies that offer basically the same product or service?
fenix001 [56]
Compare the products together
8 0
3 years ago
Read 2 more answers
Other questions:
  • In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
    14·1 answer
  • What does N represent when analyzing algorithms?
    15·1 answer
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • True/False
    13·1 answer
  • How many answers do you need to be able to write messages on here??
    6·1 answer
  • A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or
    5·1 answer
  • What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms
    6·1 answer
  • Bryan's company is new and has limited funds to work with. He has been tasked with finding a telecommunications technology that
    7·1 answer
  • Which of the following is a quality of a mixed economy?
    5·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!