answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
14

What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?

Computers and Technology
1 answer:
goblinko [34]2 years ago
3 0

Answer:

Classless Inter-Domain Routing

Explanation:

Classless Inter-Domain Routing (CIDR), pronounced “cider” or “sidder,” gets its name from the notion that it ignores the traditional A, B, and C class designations for IPv4 addresses and sets the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

You might be interested in
1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This
Delvig [45]

Answer:

Centrifugation.

Explanation:

When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This principle is used in centrifugation.

Centrifugation can be defined as the process of separating particles from a liquid solution according to density, shape, size, viscosity through the use of a centrifugal force. In order to separate these particles, the particles are poured into a liquid and placed in a centrifuge tube. A centrifuge is an electronic device used for the separation of particles in liquid through the application of centrifugal force. Once the centrifuge tube is mounted on the rotor of the centrifuge, it is spun rapidly at a specific speed thereby separating the solution; denser particles are forced to the bottom (by moving outward in the radial direction) and the lighter particles stay at the top as a result of their low density.

6 0
2 years ago
Which of the following is NOT a method in which a macro can be run?
liubo4ka [24]
C....................
7 0
2 years ago
Which of the following is an object such as a field which can be inserted into a document
ivanzaharov [21]

Answer:

SORRY but U have to make a new question.

Explanation:

bc u put which is the following is ..... u did not put the following

cant help on this one.

8 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
solong [7]

Answer:

firewalls and encryption

Explanation:

the company placed a firewall and an encryption code to the hard drive as a precaution against theft and malicious intent

3 0
2 years ago
Declare a struct named PatientData that contains two integer data members named heightInches and weightPounds. Sample output for
boyakko [2]

Answer:

struct PatientData{

   int heightInches, weightPounds;

};

Explanation:

In order to declare the required struct in the question, you need to type the keyword <em>struct</em>, then the name of the struct - <em>PatientData</em>, <em>opening curly brace</em>, data members - <em>int heightInches, weightPounds;</em>, <em>closing curly brace</em> and <em>a semicolon</em> at the end.

Note that since the object - lunaLovegood, is declared in the main function, we do not need to declare it in the struct. However, if it was not declared in the main, then we would need to write <em>lunaLovegood</em> between the closing curly brace and the semicolon.

8 0
2 years ago
Other questions:
  • Henry is creating a firewall rule that will allow inbound mail to the organization. what tcp port must he allow through the fire
    10·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/ subnet. Which of the following answers
    8·1 answer
  • In evaluating the precedence rules used by Python, what statement is accurate? a. Addition and subtraction are evaluated after a
    8·2 answers
  • Which of the following methods could be considered a "best practice" in terms of informing respondents how their answers to an o
    7·1 answer
  • Which of the following is not true of how computers represent complex information
    5·2 answers
  • (choose one) Which is the proper means to decrement the integer variable, myScore, by one?
    15·1 answer
  • Write a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original mai
    11·1 answer
  • You work at a computer repair store. A customer is having trouble with their hard drives. The computer is not recognizing all th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!