1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
1 year ago
7

Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t

o assign to network hosts on this network?.
Computers and Technology
1 answer:
Gelneren [198K]1 year ago
4 0

The subnet's IP range, which in this case is 8 bits or up to 256 addresses, is covered by the mask's 0 digits.

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Learn more about address here-

brainly.com/question/20012945

#SPJ4

You might be interested in
Which activity does not allow a person to perform any work while at the shop
polet [3.4K]

Is it apprenticeship???:D

5 0
3 years ago
(In C prog.) What is the difference between scanf, getche and getchar?
lara [203]
<span>getchar() only reads a single character input from any input stream.
getche() </span><span>reads a single character from the keyboard and displays immediately on output screen without waiting for enter key
scanf() reads the whole input line according to the data type you specified.</span>

7 0
3 years ago
Give a linear-time algorithm to sort the ratios of n given pairs of integers between 1 and n. I.e., we need to sort, within O(n)
Volgvan

Answer:

12

Explanation:

8 0
3 years ago
g Design a Boolean function called isPrime, that accepts an integer as an argument and returns True if the argument is a prime n
professor190 [17]

Answer:

#include <bits/stdc++.h>

using namespace std;

bool isPrime(int n)

{

   for(int j=2;j<=n-1;j++)  //loop to check prime..

   {

       if(n%j==0)

       return false;

   }

   return true;

}

int main(){

   int n;

   cout<<"Enter the integer"<<endl;//taking input..

   cin>>n;

   if(isPrime(n))//printing the message.

   {

       cout<<"The number you have entered is prime"<<endl;

   }

   else

   {

       cout<<"The number is not prime"<<endl;

   }

return 0;

}

Output:-

Enter the integer

13

The number you have entered is prime

Explanation:

The above written program is in C++.I have created a function called isPrime with an argument n.I have used a for loop to check if the number is prime or not.In the main function I have called the function isPrime for checking the number is prime or not.

4 0
3 years ago
What are the elements of an autobiographical narrative similar to those of a short story?
sattari [20]
A. because the form is about stories from events in a writer's life
6 0
3 years ago
Other questions:
  • Give me give me keyboard on this phone please provide nice I can't type where is the keyboard.Give me give me keyboard on this p
    6·2 answers
  • How many mustangs are built every day
    13·2 answers
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • Given a matrix input_matrix, return a Numpy array that consists of every entry of A that has: an even row index in the range [0,
    9·1 answer
  • Which statement about muzzleloaders is true? All muzzleloaders are rifles. All muzzleloaders have only one barrel. Muzzleloaders
    12·1 answer
  • Complete the method, print Multiples(), that takes in a positive integer n, and another positive integer, max. Print out all the
    15·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • What was revolutionary about Web 2.0?
    5·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!