1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
15

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?

Computers and Technology
1 answer:
Ymorist [56]3 years ago
3 0

Answer:

tiddies

Explanation:

sukk

You might be interested in
According to the computer science what isCD ROM is a ​
sesenic [268]
A CD-ROM (/ˌsiːdiːˈrɒm/, compact disc read-only memory) is a pre-pressed optical compact disc that contains data. Computers can read—but not write to or erase—CD-ROMs, i.e. it is a type of read-only memory.
Read mechanism: 600-780nm laser diode, 150 ...
Usage: Data storage
Capacity: 194 MiB (8 cm), 650–900 MiB (12 cm)

Hope this helps...
4 0
4 years ago
How to enter date in a Date/Time field?​
NikAS [45]

Answer:

Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.

Explanation:

3 0
3 years ago
Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
SSSSS [86.1K]
I’m pretty sure it’s C good luck luv
8 0
4 years ago
A group of cells is called a<br><br> Excel
arsen [322]

Answer:

Every worksheet is made up of thousands of rectangles, which are called cells. A cell is the intersection of a row and a column. ... You can also select multiple cells at the same time. A group of cells is known as a cell range

8 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Other questions:
  • Which type of data in es changes least frequently?
    15·1 answer
  • Which best describes a paraphrase?
    13·1 answer
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    13·2 answers
  • Which of the following best describes the Distribution Mix?
    15·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • You are planning trip to South America and and are worried about your devices with private keys being stolen. So you decide to s
    9·1 answer
  • An outline is most like which of the following?
    6·2 answers
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • Convert Octal 623, to Decimal number ​
    10·1 answer
  • A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!