1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
1 year ago
7

Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t

o assign to network hosts on this network?.
Computers and Technology
1 answer:
Gelneren [198K]1 year ago
4 0

The subnet's IP range, which in this case is 8 bits or up to 256 addresses, is covered by the mask's 0 digits.

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Learn more about address here-

brainly.com/question/20012945

#SPJ4

You might be interested in
Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
nata0808 [166]

Answer:

Following are the program for the above question in python:

Explanation:

def seat(num_rows,num_cols):#function definition.

   for x in range(1,num_rows+1):#first for loop.

       c='A'

       for y in range(1,num_cols+1): #second for loop.

           print(str(x)+c,end=" ") #print the value

           c=chr(ord(c)+1) #expression to form a charater addition.

seat(int(input("enter the number of rows: ")),int(input("enter the number of columns: "))) #take the input from the user.

Output:

  • If the user inputs 2 and 3, then the output is :"1A 1B 1C 2A 2B 2C 3A 3B 3C 4A 4B 4C".

Code Explanation :

  • The above code is in python language, in which the first line is used to render a message to the user then take the inputs from the user and then pass to the function after converting into int function.
  • Then there are two loops in the function which are used to print the number of the seat.
  • The first loop is used to print the row number and the second loop is used to print the column number.
4 0
4 years ago
If variable x has value 2 and y has value 2, what is the value of the following Jack expression?
saul85 [17]

Answer:

The value of the following expression is "2".

Explanation:

Here x has value 2 means x=2,and y has value 2 means y=2.

so (x+3)/(4-y)

  (2+3)/(4-2)

5/2 it gives 2 because /(slash) operator gives the quotient part .The slash    operator divide the left hand operand by the right hand operand.On dividing 5/2 it returns integer value i.e 2.

3 0
4 years ago
You want to connect to a user desktop to review windows 10 configuration settings when the user is not present. which technology
MakcuM [25]

Remote desktop is a technology that allows users to connect to a specific computer from a remote location as if they were sitting in front of it.

<h3>What is the desktop remote system?</h3>

A remote desktop is a program or an operating system feature that permits a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.

<h3>What is Remote Desktop example?</h3>

A basic example of a Remote Desktop is securing your home laptop to your office PC so you can access files, run applications, print documents, etc. on that PC without going into the office.

However, the host machine does not have to be a PC. It is often a waitperson or virtual server environment in many business use cases.

To learn more about  remote desktop, refer

brainly.com/question/4455143

#SPJ4

3 0
2 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
4 years ago
Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
Ilia_Sergeevich [38]
I think it is true (A) 
3 0
4 years ago
Other questions:
  • When did Kodak introduce film photography to the commercial market?
    10·2 answers
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • The function below takes two parameters: a string parameter: CSV_string and an integer index. This string parameter will hold a
    14·1 answer
  • Tools enable people to connect and exchange ideas
    7·2 answers
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • Can you help me with this question please ​
    13·1 answer
  • Help its in binary and im a small brain for that
    7·1 answer
  • Amogus :0) owo have a good day y'all
    12·1 answer
  • QUESTION 10
    11·1 answer
  • What is the "Driver's Compact Law"?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!