1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
2 years ago
6

Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.

Computers and Technology
1 answer:
lora16 [44]2 years ago
6 0

Answer:

12 is Network address and 128.120.131 is host address

Explanation: It is because in subnet mask we always 255 for network section and rest for host

You might be interested in
An administrator has added a firewall within an Azure virtual network. What do we know for sure about the firewall?
slavikrds [6]

Answer:

its a host based firewall

Explanation:

because the administrator put it ntentionally and the only way do disable the firewall is by signing in as the admin (if you're the admin) and turn it off manualy

or if you're not the admin, ask them to do so.

5 0
3 years ago
What structures in which lighting heating and other systems are controlled by computers
Ilia_Sergeevich [38]

Museum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

8 0
3 years ago
Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the followi
ladessa [460]
The correct answer for the question that is being presented above is this one: "D. Symbol 1 represents a transistor, symbol 2 represents a diode, symbol 3 represents a resistor, and symbol 4 represents a lightbulb." <span>Each of the symbols is labeled with a number. </span>
6 0
3 years ago
Which of the following describes the term "false information?"
pav-90 [236]
Inaccurate and misleading
3 0
4 years ago
Your computer will organize files into _______ order.
hoa [83]
I belive the anser is Alphabetical.
5 0
4 years ago
Read 2 more answers
Other questions:
  • How would you define the rule of thirds
    5·1 answer
  • You receive an email from a company you have an account with. the email states your account has been compromised and you are giv
    12·2 answers
  • Technician A says that a ratio is a comparison between two values. Technician B says that in a compression ratio, the main value
    5·1 answer
  • Arun is 5 years older than Anu. five years ago, the ratio of their ages was 3:2 . find their present age​
    10·2 answers
  • A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
    14·1 answer
  • The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal u
    11·1 answer
  • What permissions should you assign a group if you want the group to have the ability to read, add, delete, execute, and modify f
    12·1 answer
  • Steps in the systems development life cycle​
    15·2 answers
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • The storage capacity of Go ogle drive can be increased from ____________.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!