1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
3 years ago
10

Why does a layer 3 device perform the anding process on a destination ip address and subnet mask?

Computers and Technology
1 answer:
mafiozo [28]3 years ago
8 0
To get the network number and node number of the destination machine. The subnet mask is usually called the NETwork MASK, so anding it with the address gives you the network number. Using the not logical operator on the netmask then protects the node bits in a second and operation.

address & netmask = network number
address & not( netmask ) = node number

The not operator essentially just flips the bits of it's argument.
You might be interested in
What characteristics that a graphic designer should possess?​
mart [117]

Graphic design qualities that will help you succeed

Active listening. Graphic designers aren't solo artists who work in solitude to create whatever they want. ...

Clear and concise communication. ...

Time management. ...

The ability to accept constructive criticism in stride. ...

Patience. ...

Storytelling ability.

4 0
3 years ago
Read 2 more answers
It’s illegal to hack into a system without authorization, but is it ethical for a gray-hat to hack into a system if the intent i
oksian1 [2.3K]

Answer:

Some hackers are smart about there hacking .. others have a a plot but didnt test there theory

Explanation:

8 0
3 years ago
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
inn [45]

Since after update of operating system patches the end user see dots in black screen, either end user has to restore operating system old back up if he or she has or boot the operating system in safe mode.

<u>Explanation:</u>

On safe mode end user can repair the operating system; in repair mode still operating system cannot repair the operating system on same safe mode uninstall patches or recent updates of operating system during vacation.

Still it is workstation or laptop or desktop is not restoring it normally better to format and reinstall the operating system.

6 0
4 years ago
Select three nonrenewable types of energy.
trapecia [35]

Answer:

nuclear, coal,petroleum

6 0
3 years ago
Briefly describe at least five common problems users encounter due to their use of computer systems.
dexar [7]

Answer:

1. Insufficient storage space

2. Blue screen of death

3. Virus intrusion

4. Overheating

5. Stiff keyboard keys

Explanation:

When using a computer system there are certain issues that users would most likely encounter. Some of them include;

1. Insufficient storage space. This could arise because of insufficient storage in the hard drive or because the computer has limited memory space. Users might be unable to download apps because there is no space for them.

2. Blue screen of death. This occurs when the computer suddenly displays a blue screen with some information on the likely reason for the malfunction. A common cause of it is the use of corrupt devices.

3. Virus intrusion. This occurs for several reasons. It could be the result of a corrupt device, document, or application that was introduced to the computer. This could make the device to work at a slower rate.

4. Overheating. This usually occurs when the parts responsible for keeping the computer at a cool temperature malfunction. The system can crash suddenly as a result of this problem.

5. Stiff keyboard keys. Some buttons could become suddenly stiff and unable to function properly.

7 0
4 years ago
Other questions:
  • Write a program that opens a text le called quiz.txt for reading. This le contains a single line with a student's rst name then
    15·1 answer
  • Christine would like to add something to her document that will illustrate the text. She should _____.
    10·2 answers
  • which is true someone with a low credit score I . they probably make on time payments ll . they may not be able to rent the apar
    14·2 answers
  • The program evaluation and review technique (PERT) is __________. a. a network-based technique in which there is a single time e
    15·1 answer
  • -How long does a copyright last?
    6·1 answer
  • In your own words, what is pair-programming? What is the role of the driver? What is the role of the navigator? What are some be
    15·1 answer
  • Can you give 10 facts about the Victorians please
    9·1 answer
  • Please can someone help me with this?
    6·1 answer
  • The agency that started ARPANET was looking for
    14·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!