1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
2 years ago
13

What is the maximum number of host ip addresses that can exist in a class b network?

Computers and Technology
1 answer:
sergejj [24]2 years ago
8 0

65,534. is the maximum number of host ip addresses that can exist in a class b network.

<h3>What two types of IP addresses are utilized on the internet?</h3>

Every individual or business with an internet service plan will have two types of IP addresses: their private IP addresses and their public IP address. The terms public and personal relate to the network location — that is, a private IP address is used inside a network, while a public one is used outside a network.

<h3>What is a class B network?</h3>

A Class B network was a network in which all lessons had the two most-significant bits set to 1 and 0 respectively.

For these networks, the network address was given by the next 14 bits of the address, thus departing 16 bits for the numbering host on the network for a total of 65536 lectures per network.

To learn more about IP addresses, refer

brainly.com/question/21864346

#SPJ4

Complete Question is,

a. 1022

b. 32,766

c. 8190

d. 65,534.

You might be interested in
Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
goblinko [34]

Answer: She sets an access password while saving the file. hope this helps!!!!

Explanation:

4 0
3 years ago
Which tool uses images and other visual elements to provide artistic
timofeeve [1]

Two of the tool that uses images as well as other visual elements are;

Adobe Illustrator and Adobe Photoshop.

<h3>What are tools for designing?</h3>

Designing tools are the software that is been use to provide artistic inspiration  and used for different purpose of design.

These tools are very interesting and they provide artistic inspiration to programmers who are designing a program.

Learn more about tools at:

brainly.com/question/11013757

3 0
3 years ago
Once artwork is inserted into a placeholder, it can be moved around on a slide. True False
inn [45]

Answer:

The answer to this question is true.

Explanation:

The artwork is used on the PowerPoint for making the presentation more effective. The artwork is also known as Clip Art. In the Microsoft PowerPoint, the clip art is a collection of media files like image file, video file, an audio file, and an animation file. If our computer has an Internet connection, then we can add new clip art for free. If we use the artwork or clip art on slide So it can be moved around on the slide.

6 0
3 years ago
Consider the following code: x = int(input("Input an integer: ")) if (x &gt;= 0): print("Yay!") else: print("Boo!") It outputs "
Fed [463]
<h2>You have to apply the given condition in if loop.</h2>

Explanation:

if((x>=0) && (x%2==0))  

print("Yay!")

else

print("Boo!")

if((x>=0) && (x%2==0))  this statement is enough to check given expectation. the value of x is positive that is checked using  x>=0 and also the positive integer should be an even number is checked using the condition (x%2==0). The "&&" operator is used to check whether both the condition is true. So if the value of "x" is positive and even, "Yah!" will be printed. Otherwise "Boo!" will be printed.

All the other choice goes invalid becoz (x%2==1) will be true only if the number is an odd number.

7 0
3 years ago
There are different types of information systems based on the different levels of hierarchy in an organization. Which system hel
worty [1.4K]

Answer:

Decision Support System (DSS)

Explanation:

  • Decision Support System is an interactive information system that intends to help the people in an organization in business decision making.
  • These software based systems obtain large volumes of knowledge produced from the various related information systems included in corporate business processes.
  • DSS comprises of three main components that are, software system, database and user interface.
  • DSS gathers, manages and assesses business data to enable better business decision making and planning.
  • This aids organizations to detect and solve various semi-structured and unstructured problems and make decisions.
  • It helps to make the decision making process quick and efficient.
  • It helps to automate and simplify organizational processes and makes interpersonal interaction easier. DSS is flexible and adaptive to support the changes in decision making process of a user.
  • DSS enables decision makers to collect a range of data from various  sources like raw data, records, management, business models, administrators etc.
  • DSS are used in medical diagnosis (clinical decision support systems),business management, forest management, railway systems, agricultural production etc.
3 0
3 years ago
Other questions:
  • In the context of prototyping during the design phase of the systems development life cycle (SDLC), a _____ prototype shows user
    14·1 answer
  • How many bones are in a human body
    7·2 answers
  • "when a dynamic web page is requested, the web server passes the request to"
    15·1 answer
  • PLEASE HELP! Which aspect helps you to change the luminescence of your image?
    10·2 answers
  • An isotope of an element has:
    11·2 answers
  • Moore's Law states that the processing power of the latest computer chips doubles about every eighteen months. Assuming the grap
    6·1 answer
  • Which of the following would be a show stopper for the development of an enterprise mobile app? The app demands data throughput
    11·1 answer
  • Write a program that takes a point (x,y) from theuser and find where does the point lies. The pointcan
    8·1 answer
  • Which of the following describes how modern operating systems function?: A
    10·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!