1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
2 years ago
8

What is the new subnet mask in prefix format?

Computers and Technology
1 answer:
vodomira [7]2 years ago
3 0

In the case above, the the new subnet mask in prefix format is seen in IPv6 and in IPv4.

<h3>What is subnet prefix mask?</h3>

A lot or a single computer that is known to be linked to a subnet is said to shares a kind of an identical part of the IP address.

Note that this shared information is said to be called the  routing prefix, and in IPV4 (Internet Protocol Version 4), the routing prefix is said to be called a subnet mask.

Hence, The the new subnet mask in prefix format is seen in IPv6 and in IPv4 because that is the format that it always comes in.

Learn more about subnet from

brainly.com/question/8907973

#SPJ1

You might be interested in
Who made the first sandwich?
RoseWind [281]
That guy made it. john m the 4th

7 0
3 years ago
Read 2 more answers
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
scoundrel [369]

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

4 0
3 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
4 years ago
Assume Flash Sort is being used on a array of integers with Amin = 51, Amax = 71, N=10, m=5 Items are classified according to th
Yuliya22 [10]

Answer:

3

Explanation:

= 1 + (int) (4*(63 - 51)/(71-51)))

= 1 + (int) (4*12/20)

= 1 + (int) (48/20)

= 1 + (int)2.4

= 1 + 2

= 3

8 0
3 years ago
How do you add a comment box to a multiple choice question in survey monkey?
Sunny_sXe [5.5K]

Answer:

(Hope this helps can I pls have brainlist (crown) ☺️)

Explanation:

1.Drag and drop Comment Box into your survey from the BUILDER section.

2.Enter question text.

3.Configure any additional options.

4.Click Save.

4 0
3 years ago
Other questions:
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • The negotiators past relationship will affect current behavior if the parties
    12·1 answer
  • If you want to write some fancy interface on your computer with expanded communication to the Arduino, what library should you u
    13·1 answer
  • What is the meaning of the phrase the video has gone viral
    9·2 answers
  • Many languages do not use the characters of U.S. English. Suppose you wanted to be able to
    15·1 answer
  • *
    6·1 answer
  • Fre.....ee p......oint....s pt 2
    10·2 answers
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
  • How much do you think it would cost to develop an app?
    14·2 answers
  • Select the correct answer. Who takes care of the final layout of the product that meets the standards set by UX designers? A. we
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!