Answer:
subnet mask
Explanation:
A subnetwork or subnet mask is a logical subdivision of an IP network.
To find out your subnet mask, the simlest way around it is to is to run a simple command line in windows. 
Simply press the Windows key and “R” at the same time to open the command prompt and type “cmd” followed by “enter.” This will allow you to see your subnet mask.
In IPv4, the subnet mask 255.255. 255.0 is 32 bits and consists of four 8-bit octets. The address: 10.10. 10.0 subnet mask 255.255.255.0 this simply indicated that the subnet mask consists of a range of IP addresses from 10.10.10.0 - 10.10.10.255.
Subnet masks (IPv4) are often involved in identifying the range of IP addresses that make up a subnet, it can also be described as a group of IP addresses on the same network.
 
        
             
        
        
        
<u><em>Answer:</em></u>
<u><em>The speed is  </em></u>
<u><em>=
</em></u>
<u><em>30
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>
</em></u>
<u><em>Explanation:
</em></u>
<u><em>The speed of a wave is given by
</em></u>
<u><em>
</em></u>
<u><em>speed
</em></u>
<u><em>(
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>)
</em></u>
<u><em>=
</em></u>
<u><em>frequency(Hz)
</em></u>
<u><em>×
</em></u>
<u><em>wavelength (m)
</em></u>
<u><em>
</em></u>
<u><em>The frequency is  </em></u>
<u><em>f
</em></u>
<u><em>=
</em></u>
<u><em>100
</em></u>
<u><em>H
</em></u>
<u><em>z
</em></u>
<u><em>
</em></u>
<u><em>The wavelength is  </em></u>
<u><em>λ
</em></u>
<u><em>=
</em></u>
<u><em>0.3
</em></u>
<u><em>m
</em></u>
<u><em>
</em></u>
<u><em>The speed is
</em></u>
<u><em>
</em></u>
<u><em>v
</em></u>
<u><em>=
</em></u>
<u><em>λ
</em></u>
<u><em>f
</em></u>
<u><em>=
</em></u>
<u><em>0.3
</em></u>
<u><em>⋅
</em></u>
<u><em>100
</em></u>
<u><em>=
</em></u>
<u><em>30
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>
</em></u>
<u><em></em></u>
<u><em></em></u>
<u><em></em></u>
 
        
             
        
        
        
Answer:
#include <stdio.h>
int fib(int n) {
  if (n <= 0) {
    return 0;
  }
  if (n <= 2) {
    return 1;
  }
  return fib(n-1) + fib(n-2);
}
int main(void) {
  for(int nr=0; nr<=20; nr++)
    printf("Fibonacci %d is %d\n", nr, fib(nr) );
  return 0;
}
Explanation:
The code is a literal translation of the definition using a recursive function.
The recursive function is not per se a very efficient one.
 
        
             
        
        
        
Answer: (C) MAC 
Explanation:
  MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication. 
-  It basically allow the specific recipients known as the holder of the symmetric key.
 -  The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    
 
 On the other hand, all the options are incorrect as they are not the key dependent hash function. 
Therefore, Option (C) is correct. 
 
        
             
        
        
        
Participants in open source community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.