1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
2 years ago
12

How is a network address of 192.168.6.0 and a subnet mask of 255.255.254.0 written in cidr?

Computers and Technology
1 answer:
ZanzabumX [31]2 years ago
6 0
It can be written with

192.168.6.0/23

255.255.0.0 means  /16 which is class b subnet mask so as 254 is in the third octet which means /23 so you can write it as /23.
You might be interested in
If a class has member variables that are pointers, you must ensure that you implement ____.
DedPeter [7]

Answer:

objects

Explanation:

pointer are used for the objects

5 0
3 years ago
Midday is a good time to take a portrait outside.<br> true or false?
Over [174]

Answer:

B: False

Explanation:

edg2020

4 0
2 years ago
How can I download music and films at home without breaking the law?
mina [271]

Answer: use a legal music downloader

Explanation: :)

5 0
2 years ago
Read 2 more answers
How do I delete my account on Brainly? It says I must enter my password to do so, but I never set up a password. When I try the
Lady_Fox [76]
Try using your email account password
8 0
2 years ago
Excel templates makes creating a professional looking spreadsheet easier by including all of the following EXCEPT_____ in the te
Anika [276]

Answer:

Excel templates makes creating a professional looking spreadsheet easier by including all of the following except Data  in the template.

Explanation:

Templates are created to define the basic structure of any document which is repeated and the user need not do those designs from the scratch.

Normally a template will contain pre-defined formula, formatting. But it will not contain data because, the purpose of template is that the structure will be same but the value may differ and the template should react according to the data.

So any template will contain design except data. We can use existing template / default template or even create a new one.

4 0
3 years ago
Other questions:
  • If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtai
    11·1 answer
  • You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How
    10·2 answers
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    11·1 answer
  • You are planning a program to find the maximum heart rate recommended for patrons of a gym where you have a part-time job. One f
    13·1 answer
  • How do you fix this!!!!
    5·1 answer
  • What is the output for the following program?
    6·2 answers
  • What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
    8·1 answer
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!