1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
11

Subtract 01101011-00101010

Computers and Technology
2 answers:
White raven [17]3 years ago
8 0

Answer:

Alexa says minus 8

Explanation:

mafiozo [28]3 years ago
6 0
Lmaao it actually gives an answerr
You might be interested in
A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing info
Contact [7]

The option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

<h3>What is OSPF about?</h3>

The OSPF is known to be called an open Shortest Path First protocol.

It belongs to the family of IP Routing protocols as it serves as  Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

See full question below

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Learn more about OSPF  from

brainly.com/question/14604232

#SPJ1

8 0
2 years ago
All of the following are eras in IT infrastructure evolution except the​ ________. A. general purpose mainframe and​ mini-comput
Digiron [165]

Answer:

C: disruptive technology era

Explanation:

There are five main stages in IT infrastructure era and the are, in order from the oldest to the newest; the mainframe and minicomputer era, the personal computer era, the client/server era, the enterprise era, and the cloud computing being the newest in the five stages eras of IT infrastructure.

7 0
3 years ago
Kathleen has written this paragraph:
yarga [219]

Answer:

Positive media attention can transform communities in unexpected ways.

Explanation:

According to the given excerpt, it is narrated that Kathleen wrote about a town called Abbston that was recently overwhelmed by tourists as a result of the news article by a TV travel editor who wrote about the town.

Therefore, the best concluding sentence for the paragraph would be that positive media attention can transform communities in unexpected ways.

8 0
3 years ago
Read 2 more answers
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and passw
hjlf

Answer:

User-level Security

Explanation:

User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.

User-level security allows the database user access and permission to resources.

4 0
3 years ago
Which presentation guideline helps people with vision disabilities?
Alina [70]
Providing audio with images
4 0
3 years ago
Read 2 more answers
Other questions:
  • Directions Use your imagination and a word processor to write a business letter with two to three paragraphs. Your business lett
    5·1 answer
  • Write a function flush that takes as input a list of five cards, tests whether it is a flush (Note: straight flush is not a flus
    11·1 answer
  • Computer design replaced ______________
    14·1 answer
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
    10·1 answer
  • Write a for loop that computes the following sum: 5+10+15+20+...+485+490+495+500. The sum should be placed in a variable sum tha
    7·1 answer
  • What is the definition of the word uproot?
    15·1 answer
  • Please its argent and I will give you BRAINLIEST ANSWER 6. How would you confirm that a colourless liquid given to you is pure w
    10·1 answer
  • Does analogue conversation take place in source as transmitter?
    5·2 answers
  • How each programming language differs in terms of constructs, techniques, use and requirements?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!