1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
10

gven an IP address and mask of 192.168.12.0/24, design an IP addressing scheme that satisfies the following requirements. Subnet

A must support 10 hosts and Subnet B must support 60 hosts.?
Computers and Technology
1 answer:
Reika [66]3 years ago
8 0
Uh 69 +23= 92
Hope this helps :)
You might be interested in
Explain the need for data structures when developing software.
Sergio [31]

Solution:

It is  important because, it has to do operation on so without, data structures and algorithms.

It performs these operation:  

 1)Take an input

2) Process it  

3) Give back the output.

The input can be in any form, for ex while searching for directions on google maps,  the starting point and the destination as input to google maps, while logging in to any social sites, We have to give our email and password as input and so on.

Similarly, in the third step, the computer application gives us output in some form or the other.

To make this process efficient, we need to optimize all the three steps.

4 0
3 years ago
When you first open a word processor, you’ll find a ? document. A. filled B. blank C. edited
NikAS [45]
B, blank document is the answer
3 0
3 years ago
Read 2 more answers
Hey plz help me with this<br>What is malware short for?​
soldier1979 [14.2K]

Answer:

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.

Explanation:

4 0
2 years ago
The Event Viewer(Microsoft windows) or console(apple Mac OS x) is used for what purpose?​
iragen [17]

Answer:

it is used to view incidents recorded in the Application, Security, and System logs

Explanation: pls make my answer brainliest

7 0
3 years ago
What home ribbon group contains the command used for quickly converting selected cells to a table by choosing a table style?
Anni [7]
The answer would be Styles
6 0
3 years ago
Other questions:
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • The _____ element, a hypertext markup language (html) metadata element, contains a collection of metadata elements that describe
    11·2 answers
  • Why is it important to send a cover letter with a resume?
    12·2 answers
  • Why is it important to know who reviews the information posted on a Web site?​
    15·1 answer
  • What part of a computer is the most important?
    13·2 answers
  • How to simplify???? 2(-3x^2+6x+1)-2(4x^2-3x+1)<br><br>​
    7·1 answer
  • What effect on total current flow will a shorted series component have in a series-parallel circuit?
    8·1 answer
  • Please help me with this coding problem :)
    6·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
  • Write a complete program that declares an integer variable
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!