1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
15

If your network subnet mask is /16, what is the maximum number of host ids available for this network?

Computers and Technology
1 answer:
kupik [55]3 years ago
8 0
65534






-------------------------------------------
You might be interested in
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
This method is employed in order to rapidly change the locations of the website in order to ensure that no one site us used long
tester [92]

Answer:

Fast-flux

Explanation:

The techniques that is used to shift the network without shutdown of website.

4 0
4 years ago
What are the importance of switches in our electron device
svp [43]

This way we can turn it on or off so we don't waste power.

Hope I helped! Just tell me if i'm wrong!

3 0
3 years ago
A ____ is a software program written to change the behavior of a computer or other device on a network, without the permission o
Tems11 [23]
Security filter app that filters the accessibility of things it deems inappropriate
5 0
3 years ago
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge
Bumek [7]
Hmmm when they say that we have a debt of $10,000 but you don't but you don't know that so they ask you for the personal data for your bank so their can get in and get the money for you so you don't have to and that how they trick you
4 0
2 years ago
Other questions:
  • Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
    8·1 answer
  • What are the two most popular applications of theInternet?
    7·1 answer
  • Camera lenses typically have very long focal points. true or false.
    5·2 answers
  • Difference between positional and non positional number​
    12·1 answer
  • A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or
    5·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • The first version of Windows to have a Start button and taskbar was?
    5·1 answer
  • What is normalization?
    7·1 answer
  • Which of these is an example of input?
    6·1 answer
  • Kinda strange, and im good
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!