1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
9

What is the subnet mask ?

Computers and Technology
2 answers:
AleksandrR [38]3 years ago
8 0
A Subnet Mask is used to divide the IP address into network and host addresses
Marizza181 [45]3 years ago
3 0

Answer:

is a 32-bit number that masks an IP address

Explanation:

You might be interested in
Students who finish their homework after school are meeting a. intrapersonal and short-term goals b. normative and short-term go
3241004551 [841]

Answer: a. intrapersonal and short-term goals

Explanation:

Intrapersonal goals are those that we set for ourselves in our minds to accomplish. The students that are finishing their homework after school most probably set that goal in their minds and so meeting it would mean meeting their intrapersonal goals.

Homework is not a long term project but rather a short one that is usually meant to be completed within days. Completing it is therefore a short term goal.

The students who finish their homework after school are therefore accomplishing both their intrapersonal and short-term goals.

6 0
3 years ago
Read 2 more answers
Which type of chart is used to chart progress over time?
Morgarella [4.7K]

Answer: Timeline

Explanation:

6 0
3 years ago
Is techonology better? Lot of votes needed.
Nataliya [291]
In some ways yes but others... not so much. we have access to amazing things that can help so many people and some are tearing people apart or are used for illegal things. its really everyone's own opinion because of some interactions (positive or negative) that can influence them.
5 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
serg [7]

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

5 0
3 years ago
Other questions:
  • Which audio editing effect uses the option ""Get Profile"" to execute its function?
    6·1 answer
  • Why is there no ide length or timing for study breaks?​
    12·1 answer
  • What are the characteristics of a severe storm
    12·1 answer
  • About how long did it take to photograph Daguerre's photograph of the street?
    7·1 answer
  • Who is on ig and would like to be friends?​
    8·2 answers
  • Only one person can receive the same email at the same time true or false
    10·1 answer
  • What does FTTB mean?
    13·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • The unit we use to measure bending moment is...<br> A kg<br> B N<br> C Nm<br> D MPa
    13·1 answer
  • Data frames can be subset by a chosen value using ==.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!