1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
7

You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo

ur subnets of 512 addresses each
Computers and Technology
1 answer:
jeka57 [31]3 years ago
5 0
<span>10.50.24.0/23







--------------------------
</span>
You might be interested in
What are five don’ts of using a computer
Sonja [21]

Answer:

well, as long as there are no right or wrong answers, don't:

look to closely at the screen, as it may mess up your eyes

hold a drink above the computer, as it may spill and cause "sticky keys"

go to sites that you know will give your a computer a virus, cause they cost hundreds of dollars to repair, and some aren't able to come out

go on illegal sites/do illegal operations to the computer itself, because then you won't have a computer

Explanation:

3 0
3 years ago
Read 2 more answers
Can someone help me pz?
Katarina [22]
Yes definitely. now what do you need help with?
8 0
3 years ago
In a folder hierarchy, the top level is referred to as which of the following?
Vesnalui [34]

Answer:

B. root

Explanation:

Every user in Linux is assigned a folder from which they can store their files. The interpreter allows you to abbreviate your route with the “~” symbol. The ls command without any additional data shows the files in the current directory, but if after the name of the command a path is written, it shows the files in that path. Therefore, the ls ~ command shows the files in the user's folder.

In addition to the folders and files created by the user or programs, every Linux folder has two subfolders defined by default:

“..”: It is the top level folder in the file hierarchy that contains it. This subfolder is also present in the root of the filesystem (the folder with absolute path “/”), but points to itself.

“.”: It is the folder itself that appears as if it were also a subfolder. It can be considered as a "self-reference" or pointer to itself.

These folders are normal folders in the system for all purposes; that is, they can be used on routes. For example, the path /dirA/dirB/dirC/../fichero2.txt refers to the file that is stored in the dirB folder, since from dirC, the folder .. points to its predecessor, dirB. The following figure shows the interpretation of this route as well as the equivalent of the “..” and “.” Folders.

4 0
3 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
Why might information overload be a concern for consumers who use a cell phone app to research a particular purchase? What would
mrs_skeptik [129]

Answer:

Explanation:

Information overload is a term which is utilized to depict the trouble of understanding an issue and adequately settling on choices when one has excessively information about that issue. By and large, the term is related with the exorbitant amount of every day information. Information overload happens when the measure of contribution to a framework surpasses its handling limit. Leaders have genuinely constrained psychological preparing limit. Thus, when information overload happens, almost certainly, a decrease in choice quality will happen. This why it becomes a concern when it is not tackled wisely by not remaining focused.

Well, I would recommend the app developers to avoid the things are as follows:

• Give supporting information. - If a client needs more information, ensure it's to hand for them.

• Make it simple for the client to make a move. - If they have to finish an assignment there and afterward make it open and make it self-evident.

• Clarify what can anyone do the information. - What move should the client make? For what reason should the take it?

• Keep it important. - Information that really addresses the client's issues is more averse to overpower.

• Give adjusted information. - You should introduce the two sides of the coin as opposed to only one.

• Keep things straightforward. - The less information you present – the less demanding it is to get it.

• Keep it clear. - Simplicity and importance are great however information needs clearness to be successful

7 0
3 years ago
Other questions:
  • The ListIterator interface
    13·1 answer
  • Write any 2 differences between implicit variables and explicit variables.​Plz tell :' (
    10·1 answer
  • Is the cell phone changing our views about polite and impolite behavior? For example,
    15·2 answers
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now th
    10·1 answer
  • True or False
    11·1 answer
  • How to add more then one picture on a brainy question really need this
    8·1 answer
  • 2.
    11·1 answer
  • What is the top 3 cloud provider in the world with statics or data including the example and reason(s).
    11·1 answer
  • 5. What skill is unique to reading online?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!