1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
1 year ago
7

Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t

o assign to network hosts on this network?.
Computers and Technology
1 answer:
Gelneren [198K]1 year ago
4 0

The subnet's IP range, which in this case is 8 bits or up to 256 addresses, is covered by the mask's 0 digits.

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Learn more about address here-

brainly.com/question/20012945

#SPJ4

You might be interested in
How can presentation software be used in a business or professional setting? Choose all that apply.​
ahrayia [7]

Answer:

Presentations are commonly projected onto a whiteboard a large screen.

Slides can also be printed out onto clear acetate and used with a overhead projector (0HP) to project the contact onto a screen. If this method is used each acetate side usually has to be replaced my newly.

Presentations can also be set up to play through a large did you go display in reception areas of the hotels, schools, businesses etc.

3 0
4 years ago
Which part of the Office interface is located across the top of the application window and organizes common features and command
aleksklad [387]

Answer:

The correct answer to the following question will be "Ribbon".

Explanation:

  • In the configuration of the computer interface, the ribbon is indeed a graphical controlling feature in the format of a series of toolbars mounted on several tabs. The standard ribbon layout requires large toolbars, loaded with graphical keys, tabbed as well as other visual control features, organized by feature.
  • The aim of the ribbon should be to provide quick and easy access to widely used activities for each system. The ribbon is therefore tailored for each task and includes program-specific commands. Besides, the top of a ribbon contains multiple tabs that can be used to disclose various groups of commandments.

Therefore, Ribbon it the suitable answer.

6 0
3 years ago
Select the correct answer from each drop-down menu
Oksanka [162]

Answer:

First one is B size because if it's too small or big it might get pixelated or fuzzy, and for the second parr it would be B printable .

Explanation:

7 0
3 years ago
Read 2 more answers
Match each of the following terms to its definition:
Bingel [31]

I=B

II=C

III=E

IV=D

V=A

I have to write a bunch of extra things otherwise it won't let me post the answer lol.

7 0
3 years ago
You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation
kompoz [17]

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

4 0
3 years ago
Other questions:
  • Explain working principle of computer?​
    13·1 answer
  • What are the stages in the development of a multimedia project?
    6·1 answer
  • If the force of gravity _ then the weight of an object will _
    8·2 answers
  • This is not homework but how do you fix this I’ve tried everything
    9·1 answer
  • The hardware to keep the output data when finished is a
    9·1 answer
  • What does px mean in css ?
    13·1 answer
  • The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
    13·1 answer
  • Is a way og saving a file so it can be used by a different program​
    11·1 answer
  • ______ controls are information security safeguards that focus on the application of modern technologies, systems, and processes
    12·1 answer
  • Match each item with a statement below. - Uses two keys: one to encrypt data and one to decrypt data - Encryption algorithm used
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!