1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
15

Giusp minfg gấp vs ạ đáp án thôi nhé

Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
3 0

Answer:

5 c

6 a

Explanation:

kết thúc phiên là thoát ra nên chọn exit

nháy đúp chuột trái lên biểu tượng là mở chương trình

You might be interested in
Jeff decides that he would pay as much as $3,000 for a new laptop computer. He buys the computer and realizes consumer surplus o
Lady_Fox [76]

Jeff pay $2,300 for his computer.

b. $2,300

<u>Explanation:</u>

Consumer surplus can be defined as the amount that the consumer is willing to pay for a product or a service. The word surplus is a synonym for something extra or excess. It corresponds to the extra benefit that the consumer gets while buying something which may be the result of some discount, sale, or negotiation.  

Jeff realizes a consumer surplus of $700 while purchasing a laptop of $3000. As the consumer surplus is $700,

the amount Jeff has paid for the laptop is: $3000 - $700

                                          : $2300

6 0
3 years ago
5.   Which of the following attributes of a website indicates a more reliable source for information?
Leona [35]
The answer would be B because ".edu" stands for education and it shows there was a source for the information
5 0
3 years ago
A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
lawyer [7]

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

8 0
3 years ago
Select all that apply. Purposes of writing include:
nalin [4]
All of these choices are reasons people write. they all appeal to different people
6 0
4 years ago
Read 2 more answers
You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure
insens350 [35]

Answer:

network-to-network

Explanation:

A network-to-network connection requires the setup of IPsec routers on each side of the connecting networks to transparently process and route information from one node on a LAN to a node on a remote LAN.

The information needed for a network-to-network connection include:

• The externally-accessible IP addresses of the dedicated IPsec routers.

• The network address ranges of the LAN/WAN served by the IPsec routers (such as 192.168.1.0/24 or 10.0.1.0/24).

• The IP addresses of the gateway devices that route the data from the network nodes to the Internet.

3 0
3 years ago
Other questions:
  • Which of the following statements best describes how digital photographs can be used?
    10·2 answers
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • The ________ occurs when the user presses the enter key without typing a value for an input operation.
    5·1 answer
  • Which of the following characters is not allowed for java variable names
    7·1 answer
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • Which camera does Angelina use?
    12·1 answer
  • Oracion con punto focal​
    6·1 answer
  • Among object-oriented languages, one feature that varies considerably is whether the language allows multiple inheritance. C++ d
    5·1 answer
  • A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method
    8·1 answer
  • question 2 you are using a spreadsheet to organize a list of upcoming home repairs. column a contains the list of repairs, and c
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!