1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
6

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres

s of 192.168.10.100. Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?
Computers and Technology
1 answer:
Mariulka [41]3 years ago
4 0

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

You might be interested in
Which of the following is not a component of Power BI?
BlackZzzverrR [31]

The PowerData is not Power BI's components. As a result, the choice C is appropriate.

<h3>What is Power BI Desktop?</h3>

You may connect to, manipulate, and visualize your data using Power BI Desktop, a free program you can install on your local computer. You can connect to numerous different sources of data and combine them (often referred to as modeling) into a data model using Power BI Desktop.

Components of Power BI are:

  • Power BI Desktop,
  • Power BI Website,
  • Power Query,
  • Power Pivot, Power View,
  • Power Map, Power Q&A, and
  • Power Mobile Apps

Thus, power data does not fall into the component of the Power BI desktop

Learn more about Power BI ;

brainly.com/question/19332033

#SPJ1

3 0
1 year ago
A5.3 1012 kg satellite is 1,800 m from another satellite that has a mass of 3.5 x 108 kg. What is the gravitational
SIZIF [17.4K]

Answer:

F = 3.82 * 10^4N

Explanation:

Given

Mass of satellite 1 = 5.3 * 10¹²kg

Mass of satellite 2 = 3.5 * 10⁸kg

Distance between them = 1,800 m

Required

Gravitational Force between them.

The gravitational force between them is calculated as thus;

F = \frac{Gm_1m_2}{r^2}

Where G = Gravitational Constant

G = 6.67408 * 10^{-11} Nm^2/kg^2

m_1 = 5.3 * 10^{12}kg

m_2 = 3.5 * 10^8kg

r = 1800m

Substituting these values in the above formula;

F = \frac{Gm_1m_2}{r^2} becomes

F = \frac{6.67408 * 10^{-11} * 5.3 * 10^{12}*3.5 * 10^8}{1800^2}

F = \frac{6.67408 * 5.3 * 3.5 * 10^{-11} * 10^{12} * 10^8}{1800^2}

F = \frac{123.804184 * 10^{9}}{3240000}

F = \frac{123804184000}{3240000}

F = 38211.1679012

F = 3.82 * 10^4N ---- Approximated

Hence the gravitational force between them is 3.82 * 10^4N

4 0
3 years ago
What X coordinate does the center of a game begin at?
kotegsom [21]

A. 0

I am not entirely sure, I am not much of a coder(well I am but I don’t code often) so I hope this helps!

5 0
3 years ago
What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
Masja [62]
The type of electronic monitoring that involves an offender being contacted periodically by telephone or beeper to verify his or her whereabouts is called the programmed contact. It is a method used in investigations to monitor the offender in a certain situation where he is forced to remain.
7 0
3 years ago
When storing used oil, it needs to be kept in ___________ containers.
tester [92]

Answer:

Plastic container

Explanation:

because if we use iron it may rust and oil may also damage

5 0
2 years ago
Other questions:
  • Develop a Matlab program that allows you to plot the entropy of a source with variable output probabilities. We wish to observe
    8·1 answer
  • Which of the following is *not* true about logging user and program actions on a computer?
    10·1 answer
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • Which of the following is false about arrays? Group of answer choices
    15·1 answer
  • Data is?
    15·1 answer
  • Explain the term creating in word processing​
    12·1 answer
  • Edit the following statement so it uses the constant named YEAR:
    5·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!