1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
9

A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic

e resides?
Only the last number of each IP address will be unique
Only the last two numbers of each IP address will be unique
Only the last three numbers of each IP address will be unique
All four numbers of each IP address will be unique
Computers and Technology
1 answer:
lawyer [7]3 years ago
8 0

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

You might be interested in
The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
Ede4ka [16]

The terminology used to describe a possible path to a resolution to a problem from one end to the other is called a solution.

<h3 /><h3>What is terminology?</h3>

The research of these phrases and related applications is known as terminology science. A glossary is a collection of specialist words plus their corresponding interpretations in a given field.

If there is a body or a term which is the need to have a resolution that needs to be made through that the person can evaluate and find a solution for the following situation then that is called a resolution or solution for that particular problem

Learn more about terminology, here:

brainly.com/question/2511894

#SPJ1

6 0
1 year ago
Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
Alla [95]

Answer:

The type of attack is <em>Phising Email.</em>

<em />

Explanation:

Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.

5 0
3 years ago
In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
Bas_tet [7]
The correct answer is C
5 0
3 years ago
What do newly PivotTables look like?
adell [148]

Answer:

Answer is in attached image!

Explanation:

8 0
3 years ago
Given the following MIPS Code Fragment:
galben [10]

Answer:

There are 3 Data Hazard

Explanation:

Find attached the solution

6 0
3 years ago
Other questions:
  • Which term describes the order of arrangement of files and folders on a computer?
    11·1 answer
  • True / False<br> Registers are generally optimized for capacity instead of speed.
    14·1 answer
  • It is a function that ends the connection to the database.
    9·2 answers
  • An internet connection is required to access which type of software?
    5·1 answer
  • What is Java Script?
    13·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    11·1 answer
  • People, can anyone point me a highlighter for google chorme ?
    11·1 answer
  • Using existing algorithms as building blocks for new algorithms has all the following benefits EXCEPT
    12·1 answer
  • 6.What does transgenic mean?​
    12·2 answers
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!