1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
8

Write in language C, please.

Computers and Technology
1 answer:
IgorLugansk [536]3 years ago
7 0

Answer:

i don't get the question

Explanation:

You might be interested in
A __________ is software that helps a peripheral device establish communication with its host device.
vladimir2022 [97]

Answer:

Answer is Device Driver

3 0
3 years ago
In ipv4, datagram fragment might be fragmented again at the next router. re-assembly of these sub-fragments is handled by?
s2008m [1.1K]

In IPv4, the following router could fragment the datagram fragment once more. This sub-fragment reassembling is done by the first router.

<h3>What is ipv4?</h3>
  • The fourth iteration of the Internet Protocol is known as IPv4.
  • The Internet and other packet-switched networks use it as one of its primary core protocols for internetworking.
  • The first production-ready release of IPv4 was made available on the SATNET in 1982 and the ARPANET in January 1983.
  • A protocol for usage on packet-switched Link Layer networks is the Internet Protocol version 4 (IPv4) (e.g. Ethernet).
  • A capacity of roughly 4.3 billion addresses is offered by IPv4.

To learn more about ipv4, refer to:

brainly.com/question/28432421

#SPJ4

5 0
2 years ago
1
Maurinko [17]

Answer:

Microsoft PowerPoint software

Explanation:

PowerPoint is the worlds mosth popular program to create slides and charts for the office stuffs .

5 0
3 years ago
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by be
photoshop1234 [79]

Answer:

b. Certificate Authority

Explanation:

Based on the information provided within the question it can be said that they are communicating with each other by using a certificate authority. This term refers to a company or organization that provides security verification by issuing both parties cryptographic keys which are specifically verified by the company in order to allow both parties to know exactly who they are communicating with.

5 0
3 years ago
A client is currently struggling with late-stage integration and manual deployments. They want to find another method that will
Papessa [141]

Answer:

It can deliver the services faster with higher reliability and quality

4 0
3 years ago
Other questions:
  • Which result would support the particle theory of light?
    6·2 answers
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    13·1 answer
  • Suppose you want to write an if statement with multiple alternatives to print out someone's tax bracket based on their income. A
    7·1 answer
  • What is HTML ? <br>Give a small description about html
    12·2 answers
  • Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE eleme
    7·1 answer
  • A printer is considered to be in the category of
    5·2 answers
  • John has recently retired from an administrative, yet technical job which he held for 40 years. He decided to pursue a life-long
    11·1 answer
  • The involvement of the United States in the ______ and ______ resulted in _______ .
    15·1 answer
  • Write a short program that asks the user to enter a month &amp; prints a message based on the month
    8·1 answer
  • The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!