1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
4 years ago
5

A network address is 131.247.160.0/19. The 19 implies that

Computers and Technology
1 answer:
anyanavicka [17]4 years ago
4 0

Answer:

D. 19 bits are reserved for the network part of IP addresses on the Network

Explanation:

The /19, expresses in the CIDR (Classless Interdomain Routing) notation, how many bits are part of the address mask, which represent the network ID in the IPv4 address.

In this case, we have the first 19 bits set to “1”, which in decimal notation should be written as follows:

255.255.224.0

You might be interested in
? Question<br> How are the Internet and the World Wide Web different from each other?
KengaRu [80]

Answer:There just different

Explanation:

The world wide web, or web for short, are the pages you see when you're at a device and you're online. But the internet is the network of connected computers that the web works on, as well as what emails and files travel across. ... The world wide web contains the things you see on the roads like houses and shops.

4 0
3 years ago
Is ryan patrick cullen gay
pshichka [43]

who is that? ..........

6 0
3 years ago
Read 2 more answers
Each character in a string has a(n) _______________ which specifies its position in the string.
-BARSIC- [3]
<span>The string is a sequence of characters.</span><span>
Each character in a string has an index which specifies its position in the string.
</span>The index of the first character is 0, the second character is 1, and so on.The character at the nth position has the index n.

5 0
3 years ago
Taylor is getting ready to send an e-mail. In three to five sentences, give Taylor some advice for sending an effective email.
KengaRu [80]

Answer:

  • Include subject lines since they are important
  • use bullet points
  • keep it short
  • avoid too many exclamation marks
  • watch your tone
3 0
3 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Paragraph: Read the following two e-mail messages. In a paragraph of no less than 125 words, explain why e-mail B is the more ap
    11·1 answer
  • I'm a number less then 40000.all my digits are multiples of 3.my first third a d fifth digits are the same both of my thousands
    10·1 answer
  • If you want to copy data from one cel to another cell that is several rows down in a worksheet, which method should you use?
    11·1 answer
  • Question 3.3. Which of the following is NOT a computer protocol? FTP SMTP ISP TCP
    11·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • Florida law requires every child blank years of age or younger use a crash tested federally be approved child restraint device
    5·2 answers
  • What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Mana
    12·1 answer
  • Python 3.12 LAB: Input and formatted output: Right-facing arrow Given input characters for an arrowhead and arrow body, print a
    15·1 answer
  • Which factors have increased the need for the latest cybersecurity technologies?
    9·1 answer
  • Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of__________e-commerce transactions.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!