1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
2 years ago
12

10.

Computers and Technology
1 answer:
vredina [299]2 years ago
3 0

Answer:

192.37.48.98 is Class C

You might be interested in
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
0 50 100 150 200 250 300 350 400 Shape Size These shapes are the correct 50 01 100 150 Pattern Reference If you don't have red,
cricket20 [7]

Answer:

0 540 100 200 350 400 550 600 750

Explanation:

hope this helped

4 0
3 years ago
Read 2 more answers
Distinguish between a computer drive and computer driver​
rewona [7]

Answer:

The word Drive typically refers to a mechanical hard drive or solid-state hard drive used to store the OS, data and programs. A driver is software code that interfaces the various devices in the computer with the processing system.

Explanation:

..............................................................

6 0
2 years ago
There are only about_____major language branches throughout the world
aleksley [76]
There are only about 20
4 0
4 years ago
Muffet from undertale drawing
allochka39001 [22]

Answer:

:) thats amazing

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
    13·1 answer
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Applications software is also known as
    14·2 answers
  • In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them?
    10·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • Write a program that reads a string of characters, pushing each character onto a stack as it is read and simultaneously adding i
    5·1 answer
  • , 13 dB correspond to a power ratio of ....?
    14·1 answer
  • What is the difference between ‘’ and “” string type in python?
    13·1 answer
  • What is the output of this program?
    10·2 answers
  • When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!