Answer:
a. 255.255.255.0 (class C)
b. 255.255.255.224
Explanation:
Here, we want to give the implied subnet mask of the given classful IPV4 address
We proceed as follows;
Given IPv4 address: 200.200.200.200
Classes
Class A : 0.0.0.0 to 127.255.255.255
Class B: 128.0.0.0 to 191.255.255.255
Class C: 192.0.0.0 to 223.255.255.255
Class D: 224.0.0.0 to 239.255.255.255
so 200.200.200.200 belongs to Class C and it's subnet mask is 255.255.255.0
In CIDR(Classless Inter Domain Routing)
subnet /27 bits means 27 1s and 5 0s. so subnet
i.e 11111111.11111111.11111111.11100000 which in dotted decimal format is 255.255.255.224 .
Answer:
The answer is below
Explanation:
Computer System is widely known for its ability to perform its functions faster by giving out information.
The computer system operation follows certain principles, some of which are:
1. It makes use of the OPERATING SYSTEM to link the hardware and the software together, without it, the computer system is useless.
2. It works with INPUT DEVICES such as keyboards or stylus. Without input devices, there is no way humans can communicate with the computer system
3. It works with OUTPUT DEVICES such as monitors and speakers. Without output devices, there is no way computers can communicate or give back information to humans.
4. It works with the NETWORK such as LAN or WIFI to provides the sharing of data files to other users or computers. Without the network, the computer system can only work within certain spaces, with no way to share data or files with others far away.
An app you can look up on Google chrome called Aptoide has it on there for you to install.
Small programs stored on the harddrive that provide basic functionality for he devices listed would be called Hardware Drivers.
I hope this helps!
Answer:
The matrix theory is used by hill cipher.
Explanation:
Th technique which uses matrix theory is hill cipher technique.
Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.
For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.