1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
2 years ago
8

Which factor is NOT used to determine who can be let go during a downsizing?

Computers and Technology
2 answers:
OverLord2011 [107]2 years ago
8 0
It’s C- gender. Hope this helped!
miv72 [106K]2 years ago
3 0
The answer is c. Gender
You might be interested in
Sharon is thinking about opening a bakery. She knows she wants to set her own hours, reduce her stress and make a profit. But sh
kondaur [170]
C would not be a beginner move.

hope it helps
6 0
3 years ago
You are finally at the stage of the software life cycle where you begin programming. What is this stage called?
nataly862011 [7]
You are finally at the stage of the software life cycle where you begin programming. What is this stage called?

development

5 0
2 years ago
What practices will help you avoid sending out e-mail to the wrong person?
wel
Check who you are sending it to before you hit send 
5 0
3 years ago
What are the advantages and disadvantages of UTF-8 compared to ASCII?
Romashka [77]

Answer:

UTF-8 and ASCII both are the character encoding.

In a system,every character has some binary representation,these are the method to encode them.Earlier only ASCII was there, for every character it uses 8 bits to represent.In ASCII only 8 bytes were there i.e 2^8 that is 256.We can't represent number beyond than 127 so it generate a need for other encoding to get into,these drawbacks lead to Unicode,UTF-8.

As ASCII codes only uses a single byte,UTF-8 uses upto 6 bytes to represent the characters.So we can save characters which are as long as 2^48 characters. We can read this encoding easily by the help of shift operators and it is also independent of byte order.

As messages on internet were transferred over 7 bit ASCII messages,so many mail servers removed this encoding.    

6 0
2 years ago
ICMP
sp2606 [1]

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are <em>echo request</em> and <em>echo reply.</em>

<em />

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as <em>Time Exceeded</em>) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP <em>echo request </em>packets to the host and then waits for an ICMP <em>echo reply</em> from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

6 0
2 years ago
Other questions:
  • Which of the following information security technology is used for avoiding browser-based hacking?
    11·2 answers
  • What do we call a subset of new media in which groups and their fans can interact directly?
    14·1 answer
  • Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
    13·2 answers
  • Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
    8·1 answer
  • Self contained sequences of actions to be performed are?
    6·1 answer
  • Which of the following should get a Page Quality (PQ) rating of Low or Lowest?
    5·1 answer
  • The three basic processes of memory are ______.
    10·1 answer
  • Which are examples of non-linear presentations? Choose all that apply.
    11·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • (1) Experiment Purpose
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!