1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
2 years ago
14

Which term refers to a shorthand method for identifying network and host bits in an ip address?

Computers and Technology
1 answer:
zloy xaker [14]2 years ago
7 0

A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

<h3>What is CIDR Notation?</h3>

This is known to be a term that was devised in 1993 by the IETF. The  CIDR is said to be a  shorthand method for knowing network and host bits in an IP address.

Therefore, one can say that A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

Learn more about CIDR Notation from

brainly.com/question/14985928

#SPJ12

You might be interested in
What is copyrights used for​
Inga [223]

if something belongs to someone it makes it so someone else cannot steal it and claim it to be their own

4 0
3 years ago
Read 2 more answers
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
You approach a railroad crossing with a cross buck sign that has no lights or gates. What should you do?
dalvyx [7]
You should or must stop 50 feet away from it.
8 0
3 years ago
Read 2 more answers
Jane is designing a print brochure for a retail company. She’s having trouble deciding on the page margin. Which best practice w
8090 [49]

I think the answer will be C

7 0
3 years ago
Read 2 more answers
What could happen if we cannot save the life​
padilas [110]

Answer:

If we could not save the people or animals life they would die

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
    15·1 answer
  • The web server software used has a significant impact on how a web site's web pages look on a user's computer.
    7·1 answer
  • What is a Better Computer?<br> A. Alien<br> B. Microsoft<br> C. Windows<br> D. Apple
    11·2 answers
  • PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is
    14·1 answer
  • Difference between change management n asset management
    11·1 answer
  • Question 1 Multiple Choice Worth 5 points)
    10·1 answer
  • Someone help me please
    9·1 answer
  • ________ allows the computer to get its configuration information from the network instead of the network administrator providin
    5·1 answer
  • In VBA, write a code that does as follows: The first worksheet ("Ex. 1") has a list of 50 numbers. Write a program that will rea
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!