1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
9

It is a blueprint of a project​

Computers and Technology
2 answers:
lbvjy [14]3 years ago
6 0

Answer:

oh good but where is that blue print

Marizza181 [45]3 years ago
4 0
Where is the blueprint? I cant see it
You might be interested in
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they
Ahat [919]

Answer:

California Identity Theft Statute

Explanation:

The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.

4 0
3 years ago
Aaron is stating the main idea of what he read in his own words. He is _____.
Feliz [49]

Answer:

summarizing

Explanation:

when someone explains in their own words the main idea of a story, it is summarizing.

8 0
2 years ago
Read 2 more answers
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
3 years ago
How to keep tools and equipment safeuh​
ivanzaharov [21]

Answer:

Use pelican, or similar heavy duty cases

Explanation:

Pelican is a brand btw. 10/10 would recommend

8 0
3 years ago
Read 2 more answers
A database is used instead of a spreadsheet when
guajiro [1.7K]
            Both spreadsheets and databases, play a part in the daily
    operations of many businesses. While you do not necessarily need to choose between spreadsheets and databases, they are often suited to different types of tasks. Understanding the key differences between spreadsheets and databases is vital if you want to make the best use of either or both of them.
     Spreadsheets and databases share some characteristics, but they involve different technologies.
               Databases generally involve a higher level of technical processing.
-Rosie
4 0
3 years ago
Other questions:
  • Which is a good technique for effectively proofreading your presentation?
    7·1 answer
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • This was not a "true" operating system, but rather an operating environment.
    5·1 answer
  • What is the definition of a server?
    11·1 answer
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    7·2 answers
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • You are purchasing several PC systems that will be used as thin clients in a large organization. Which hardware selection criter
    9·1 answer
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a f
    11·1 answer
  • A software copyright?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!