1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
12

I’ll give Brainly if u answer all please ASAP

Computers and Technology
1 answer:
Yuki888 [10]3 years ago
8 0

Answer:

Answers are: 38, 135, 23, 209, 53 & 181 respectively

Explanation:

You might be interested in
Write the program of while loop .<br>​
alexdok [17]

Answer:#include<stdio.h>  

int main(){    

int i=1;      

while(i<=10){      

printf("%d \n",i);      

i++;      

}  

return 0;  

}    

Explanation:

This is the program I coded on the while loop.

8 0
2 years ago
Read 2 more answers
In order to access the internet, it is not necessary to have an internet service provider (isp).true or false
Stolb23 [73]

ITS FALSE!!!! I tried true, but it was wrong. Don't make the same mistake like me...



(Answer is false)

7 0
4 years ago
Read 2 more answers
What is one advantage of NAT?
Jet001 [13]

Answer:

a. The company can lease fewer public IP addresses.

Explanation:

A network is an interconnection or intercommunication of network devices within a specific location. There are different types of networks, they are local area network (LAN), wide area network (WAN) etc.

The LAN is a network in a small area, while WAN covers a very large area or distance.

The LAN uses private IP addresses that are not routable on the internet and subscribing for public IP addresses (which are routable on the internet) on all computers in a network, would be expensive and would cause traffic congestion.

3 0
3 years ago
Read 2 more answers
The IPv4 address scheme has enough IP addresses to give every blade of glass in the world its own unique IP. True False
Andrew [12]

Answer:

False

Explanation:

IPv4 address are composed of four octets (8 bit numbers), ranging from <em>0.0.0.0 to 255.255.255.255</em>

All those 32 bits, in decimal notation, can form a total of

2^{32} = 4,294,967,296 different addresses.

Being more than 4 billion addresses and ignoring that some addressesare reserved for special uses, even present human population almost doubles that number.

So it is safe to state that IPv4 addresses is <u>not </u>enough to give every blade of grass its own IP.

8 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the first stage of perception
    6·2 answers
  • _______ ______ is the creation of a computer program by utilizing pictorial elements. Question 36 options: A. Assembly Programmi
    7·2 answers
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • How can you say that a computer is a versatile machine?​
    7·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
    7·1 answer
  • Choose a different well-known company that you know of, and describe its direct and indirect competitors. Describe at least 2 di
    9·2 answers
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • D Question 9 What is output by the following?
    5·1 answer
  • Note that common skills are listed toward the top, and less common skills are listed toward the bottom. According to O*NET, what
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!