1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
9

A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic

e resides?
Only the last number of each IP address will be unique
Only the last two numbers of each IP address will be unique
Only the last three numbers of each IP address will be unique
All four numbers of each IP address will be unique
Computers and Technology
1 answer:
lawyer [7]3 years ago
8 0

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

You might be interested in
Which binary number is the greatest?<br> 11011<br> 11001<br> 11100<br> 11010<br> 11000
Masteriza [31]

Answer:

the third one

Explanation:

the rest is below 28 apart from the third one which is 28 and is the most

3 0
3 years ago
Why do designers use tonal shading?
Simora [160]

Designers use tonal shading because tonal shading gives a drawling dimension.


Hopefully this will help you out! :)

4 0
3 years ago
Read 2 more answers
Does any one know how to code? If you do can you help me with my project?
fomenos

Answer:

kinda look it up!!!

Explanation:

go to code.org free coding

4 0
3 years ago
Read 2 more answers
The windows logon process has unexpectedly terminated
dusya [7]

Answer

Windows corrupted

Explanation:

Try buying a new windows or resetting your laptop/pc

or your service failed to register/start

7 0
3 years ago
QUESTION 7 of 20: What is it called when different seats are priced differently?
never [62]
Yield management pricing.
6 0
3 years ago
Other questions:
  • Which of the following can be both an input device and an output device? mouse. keyboard. display screen. laser printer .
    9·1 answer
  • Hard drives are usually self-contained, sealed devices. Why must the case for the hard drive remain sealed closed?
    8·1 answer
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
    8·1 answer
  • Which of these is a social consequence of effective communication
    12·1 answer
  • Does anyone know this ? this website is scratch btw.
    10·1 answer
  • The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
    12·1 answer
  • All organizations need good quality cybersecurity to ensure _____. Select 4 options.
    12·2 answers
  • Why does my roku tv keep disconnecting from the internet.
    13·1 answer
  • If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!