1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
9

What is the subnet mask ?

Computers and Technology
2 answers:
AleksandrR [38]3 years ago
8 0
A Subnet Mask is used to divide the IP address into network and host addresses
Marizza181 [45]3 years ago
3 0

Answer:

is a 32-bit number that masks an IP address

Explanation:

You might be interested in
Which of the following occupations uses math concepts to determine if a particular event would occur and the related costs of th
krek1111 [17]

The occupations that utilize math concepts to determine if a particular event would occur and the related costs of the occurrence is Actuary statistician.

This statistician helps in related costs of the occurrence as well as other datas.

<h3>Who is actuary statistician?</h3>

Actuaries are experts that works in insurance industry that wirk on data related to risk as well as statistical probabilities of future occurrences.

Learn more about statistians at;

brainly.com/question/15980493

4 0
3 years ago
Which of the following is the largest measurement for the weight of a bag of dog food?
jasenka [17]

Answer:

approximately 5 lbs but no sure weight.

6 0
3 years ago
Read 2 more answers
The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
joja [24]

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

<u>Below seem to be some measure you should take to correct this mistake.</u>

  • Verify whether Droplet's host IP address seems to be right.  
  • Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet.
  • Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

7 0
3 years ago
How would you define a relational database ?
UNO [17]

Answer: (D) Database design follows the twelve principles proffered by Dr. Edgar F. Codd

Explanation:

 The relational database is basically based on the relational model of the data which is proposed by the Dr Edger F. codd and he mainly introduced the twelve basics principle of the database designing in the database system. He also contributed various valuable principle in the computer science.

The twelve principle are:

  • The first rule of the relational database is the information rule as it represented all data or information
  • Independence of the integrity
  • Viewing various updating rule
  • Logically treatment of various NULL value
  • Independence of the physical database
  • Distribution in-dependency
  • Various delete, insert and update rules
  • The overall logical description of the database are basically stored in the database directory
  • There is no subversion rule
  • There is guarantee accessing rule
  • Proper rule for data language
  • The relational database level actions

7 0
3 years ago
Convert the following decimal numbers into binary numbers. <br><br>pls ASAP<br>​
Anna007 [38]

Explanation:

Given, the cost price of the TV is Rs 24600. Now, the cooler costs Rs 800 more than one-third of the TV. The cost price of the cooler is Rs 9000.

6 0
3 years ago
Other questions:
  • Repetition learning rates are the same for everyone, so there is no need to find an activation and break pattern that works
    12·2 answers
  • What file formats can you safely use in a video presentation
    14·1 answer
  • Rather than manually setting a print area each time you want to print a range, you can ____ the range.
    13·1 answer
  • Five batch jobs. A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6, 2
    14·1 answer
  • Look at the following description of a problem domain:The bank offers the following types of accounts to its customers: saving a
    8·1 answer
  • Write a javascript program that reads three integers named start, end, and divisor from three textfields. your program must outp
    6·2 answers
  • Write down the three part of a computer.<br>​
    7·1 answer
  • Installation and the ongoing maintenance of software in a database system are the job of the database __
    6·1 answer
  • What is the full form of 'Rom<br>​
    7·2 answers
  • The most effective technique of malware propagation among the following list
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!