1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
2 years ago
13

What is the maximum number of host ip addresses that can exist in a class b network?

Computers and Technology
1 answer:
sergejj [24]2 years ago
8 0

65,534. is the maximum number of host ip addresses that can exist in a class b network.

<h3>What two types of IP addresses are utilized on the internet?</h3>

Every individual or business with an internet service plan will have two types of IP addresses: their private IP addresses and their public IP address. The terms public and personal relate to the network location — that is, a private IP address is used inside a network, while a public one is used outside a network.

<h3>What is a class B network?</h3>

A Class B network was a network in which all lessons had the two most-significant bits set to 1 and 0 respectively.

For these networks, the network address was given by the next 14 bits of the address, thus departing 16 bits for the numbering host on the network for a total of 65536 lectures per network.

To learn more about IP addresses, refer

brainly.com/question/21864346

#SPJ4

Complete Question is,

a. 1022

b. 32,766

c. 8190

d. 65,534.

You might be interested in
You are the Emergency Management Director of a small island nation. Your nation has come under Cyber-attack and the attackers ha
kozerog [31]

Answer:

okay actually what are you trying to get an answer for

Explanation:

8 0
2 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
Who can help me on my school we will to google meet and i share my screen
Deffense [45]
Me ......................
7 0
3 years ago
write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a cube. The program c
PilotLPTM [1.2K]

Answer:

prompt("Enter a value for one edge of a cube")

Store user's value into edgeCube

area = 6 * (edgeCube * edgeCube)

volume = edgeCube * edgeCube * edgeCube

print("One side of the cube is: " + edgecube);

print("The area is: " + area)

print("The volume is: " + volume)

8 0
3 years ago
Which trait depicts honesty?
Aliun [14]

(B) reporting additional cash found in the cash register

5 0
4 years ago
Other questions:
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • A machine is classified as a compound machine if it?
    8·2 answers
  • Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
    9·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    6·2 answers
  • The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a
    5·1 answer
  • What are the five Ws?<br> (I don’t even know what this means)
    5·2 answers
  • What is modern? explain​
    11·1 answer
  • Which of the following items can you locate in a document using the navigation pane? Choose the answer.
    10·1 answer
  • Which of the following statements about ip addresses is true?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!