1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
9

Dfd symbols are referenced by using all ____ letters for the symbol name.

Computers and Technology
1 answer:
yawa3891 [41]3 years ago
4 0
All CAPITAL letters]
hope you got your answer
You might be interested in
What's the smallest part of a computer
Murljashka [212]

Answer:

A byte

Explanation:

I just had that question on my quiz

7 0
3 years ago
Read 2 more answers
Patronage of most Medieval musicians was supplied by the
Arturiano [62]

Answer:

wrong^^its church

Explanation:

3 0
3 years ago
Are all the computer users known as programmer ​
Evgesh-ka [11]

Answer:

Nope

Explanation:

programmers are diff

6 0
2 years ago
Did the Z3 computer invented by Konrad Zuse have a negative effect on society?
musickatia [10]

Answer:

Explanation:

Không

4 0
2 years ago
Read 2 more answers
3. An organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that ex
lesya [120]

Answer:

The correct answer is: 255.255.255.192.

Explanation:

A subnet mask complements an Internet Protocol (IP). Thanks to subnet masks IP addresses can be identified because they seem to be all the same but the subnet mask avoids confusion. If four subnets are to be created for the IP 192.168.90.0 3 bits of that IP must be used to create the subnet resulting in 255.255.255.192. Then:

  • <em>Number of subnets</em>: 2^{3} - 2 = 6
  • <em>Number of hosts per subnet</em> = 2^{5} -2  = 30
3 0
3 years ago
Other questions:
  • 6. Sandra did a survey to see how
    9·1 answer
  • A(n ____ is a named group of formatting characteristics.
    7·1 answer
  • In which situation will file compression be required to complete the task
    15·1 answer
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • What is an Apple Pen?
    5·2 answers
  • A finally clause will execute:
    8·1 answer
  • How does leadership play a role in IT management? How does leadership need to be aligned to the company’s goals for IT managemen
    9·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!