1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
11

Please

Computers and Technology
1 answer:
Andrew [12]3 years ago
3 0

Answer:

C. 2^16

Explanation:

In Computer Networking, there are five (5) classes of IP addresses, these include;

- Class A

- Class B

- Class C

- Class D

- Class E

The various classes of IP address are represented by the value of their first octet. The first octet value of Class B is 128-191 with a subnet mask of 16.

Hence, from the IP address 149.130.x.y where x and y are 8-bit numbers. The x and y equals 16-bit numbers.

Thus, 2^16 devices can connect to the Wellesley network before we run out of IP addresses.

You might be interested in
13. You're expecting an important call from Mr. Suarez, a potential customer. While waiting for this call, your supervisor calls
8_murik_8 [283]
The answer is call waiting
4 0
3 years ago
Write the icon of full justification​
ad-work [718]

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

6 0
2 years ago
True or False. A compact disc (CD) stores music in a coded pattern of tiny pits 10−7m deep. The pits are arranged in a track tha
vovikov84 [41]

Answer:

True.

Explanation:

Yes it is true. A CD works on exactly the same pattern defined above.

3 0
3 years ago
________ results when leisure time and available tools allow us to engage in creative acts.
natta225 [31]
Cognitive surplus results when leisure time and available tools allow us to engage in creative acts. It is a term that was introduced by Clay Shirky which pertains to the synthesis of the excess of people's energy, time and creativity leading to productivity sharing and creation.
4 0
3 years ago
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
Hunter-Best [27]

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

<h3>What type of hackers are motivated by social or political issues?</h3>

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

brainly.com/question/5483494

#SPJ1

5 0
2 years ago
Other questions:
  • Match the part of motherboard to its function
    15·1 answer
  • A cooler with heat pipes, which contain a small amount of liquid that becomes a vapor when heated, allowing heat to be drawn awa
    10·1 answer
  • Question 1 (1 point)
    10·2 answers
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • What are two constraints that continuous-media files have that conventional data files generally do not have?
    12·1 answer
  • You can click the ____ button to undo an automatic correction.
    9·1 answer
  • This isn't a question
    8·1 answer
  • Difference between statement x=+5 and x+=5​
    7·1 answer
  • Implement the Tollable interface. It provides one method, pay, that accepts an int (how many dollars to pay), and returns an int
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!