1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
2 years ago
6

Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.

Computers and Technology
1 answer:
lora16 [44]2 years ago
6 0

Answer:

12 is Network address and 128.120.131 is host address

Explanation: It is because in subnet mask we always 255 for network section and rest for host

You might be interested in
I'm trying to connect fire stick but it doesn't have HDMI input so guys what would do you recommend to buy I tried a converter b
mihalych1998 [28]
I suggest you get a adapter from the old video input to HDMI
7 0
3 years ago
Enter just the letter of the correct answer
Viefleur [7K]

Answer:

C. WDS

Explanation:

DND is for rolling dice and arguing about alignments

WiFi Analyzer just monitors your WiFi's stats and health

--> WDS lets you wirelessly connect two routers for larger range

DHCP is for IP address distribution.

3 0
3 years ago
The computer that process data that are represented in the form of discrete values are called​
Vinvika [58]

Answer:

Digital computer

Explanation:

The computer that process data that are represented in the form of discrete values are called digital computer.

7 0
3 years ago
Read 2 more answers
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets p
Bas_tet [7]

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

8 0
3 years ago
In the United States, the government controls and owns a very large percentage of the media.
jeka94
True they can pretty much see anything you do and on top of that they can look through your cameras. thats why i keep tape on my camera on my laptop
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is computer virus?
    8·1 answer
  • To have the most impact when using email, you should structure your messages so that
    5·1 answer
  • If a speed mismatch was configured between two Cisco routers' Ethernet interfaces, what would the status of this interface be?
    12·1 answer
  • Write a program that unpickle's employee dictionary and while reading from the dictionary, it allows users to lookup an employee
    9·1 answer
  • "The ____________________ function is a logical function that returns a TRUE value if any of the logical conditions are true and
    14·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • What is included on the HP PC Hardware Diagnostics 3-in-1 USB Key that allows you to recover systems that cannot boot?
    14·1 answer
  • The __________ method can determine whether a string contains a value that can be converted to a specific data type before it is
    12·1 answer
  • A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
    7·1 answer
  • Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!