1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
2 years ago
10

What is the decimal format of the binary IP address 11001110.00111010.10101010.01000011?

Computers and Technology
1 answer:
Neporo4naja [7]2 years ago
7 0

Answer:

206.58.170.67 is the decimal format of the given binary IP address.

Explanation:

we can convert the binary number into decimal by the following procedure.

11001110 = 1x2⁷+1x2⁶+0x2⁵+0x2⁴+1x2³+1x2²+1x2¹+0x2⁰

            = 128 + 64 + 0 + 0 + 8 + 4 + 2 + 0

            =   206

00111010 = 0x2⁷+0x2⁶+1x2⁵+ 1x2⁴+1x2³+0x2²+1x2¹+0x2⁰

               = 0 + 0 + 32 + 16 + 8 + 0 + 2 + 0

               = 58

10101010 = 1x2⁷+0x2⁶+1x2⁵+ 0x2⁴+1x2³+0x2²+1x2¹+0x2⁰

              = 128 + 0 + 32 + 0 + 8 + 0 + 2 + 0

              = 170

01000011 =  0x2⁷+ 1x2⁶+ 0x2⁵+ 0x2⁴+ 0x2³+0x2²+1x2¹+1x2⁰

                = 0 + 64 + 0 + 0 + 0 + 0 + 2 + 1

                =  67

so, the IP address is becomes 206.58.170.67

You might be interested in
February 1995, Kevin Mitnick was arrested. While on parole was he allowed to have a phone or computer?
m_a_m_a [10]

Answer:

He was not allowed on a phone of computer after being arrested.

Explanation:

If you read about it he wasn't even allowed to work at 7-11 because of an electronic cash register.

6 0
2 years ago
Read 2 more answers
How the data is converted into the information?​
leonid [27]

Answer:

the data is converted into information by data processing

7 0
3 years ago
Read 2 more answers
Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
rosijanka [135]

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

4 0
3 years ago
¿ cuales son las características de revolución industrial?
Daniel [21]

Answer:

La producción industrial a gran escala, especialmente de alimentos. ... El desarrollo de nuevas industrias como la textil, la siderúrgica (metales) o la minera. La sustitución del hierro por el acero, un material más duro y resistente.

Espero que esto sirva!

7 0
3 years ago
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade
jeka57 [31]

Answer:

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN?

Explanation:

3 0
2 years ago
Other questions:
  • Artists who draw images on a computer often use a stylus in conjunction with special _________ tablets, which offer extra-sensit
    15·1 answer
  • 1. An Excel file is called a workbook?<br> A) True<br> B) False
    6·2 answers
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • A cell reference that has only one $ is referred to as a(n) ____ cell reference. alternative mixed relative absolute
    7·1 answer
  • Ashley works for a movie theater. The theater has decided to host some special events over the summer. She needs to communicate
    8·2 answers
  • Why is plastic durable?
    9·2 answers
  • User can use ______ commands to search for and correct words in a document
    13·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!