1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
9

A network with 6 bits remaining for the host portion will have how many usable hosts?​

Computers and Technology
1 answer:
Readme [11.4K]3 years ago
6 0
<span>A network with 6 bits remaining for the host portion will have 62 usable hosts. The netmask is </span><span>255.255.255.192/26, the shorthand is [6-bit] which is equal to the number of addresses as <span>= 62 hosts + 1 bcast + 1 net base</span></span>
You might be interested in
Describe how layers in the ISO reference model correspond tolayers in the TCP/IP reference model.
Alexxx [7]

Answer and explanation : The TCP/IP means TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL It governs all the communication which are performed over network it has a set of protocol. It defines how different types of conversation are performed without any fault through a network

THERE ARE 5 TYPES OF LAYER IN TCP/IP MODEL

  • APPLICATION LAYER: It is present at upper level it is used for high level products for the network communication
  • TRANSPORT LAYER: This layer is used for transfering the message from one end to other end
  • NETWORK LAYER : Routers are present in network layer which are are responsible for data transmission
  • DATALINK LAYER : it is used when there is any problem in physical layer for correcting this datalink are used
  • PHYSICAL LAYER: Physical; layer are responsible for codding purpose which we used in communication process

5 0
4 years ago
Which of the following Python methods in scipy.stats submodule returns the P-value for performing a hypothesis test for the sign
ipn [44]

Answer:

Option B is the correct answer for the following question.

Explanation:

The following option is true because the pearsonr from scipy module is the method of the Python Programming Language in the submodule i.e., "scipy.stats" which print or return P-value for operating the hypothesis test for the value of correlation coefficient. So, that's why the following option is correct.

7 0
3 years ago
10. Select the correct answer.
Aleks [24]
B) licensing because they are giving Thomas permission to use the images
6 0
3 years ago
Read 2 more answers
After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
masha68 [24]
B. New Entry

I hope this helps
8 0
3 years ago
Read 2 more answers
Peter Chen developed ERDs in 1976. Since then Charles Bachman and James Martin have added some slight refinements to the basic E
shusha [124]

Answer:

Check the explanation

Explanation:

In RDBMS relational database, the keys play an essential role in making the database reliable and relational in which two or more relations (tables) can be divided into a range of relations with the use of diverse types of keys due to which the redundancy decreases and flexibility of data storage increases.

The following are the usage of keys in a database:

   It helps in identifying a specific record that is present in the table.

   It is used in minimizing the redundancy from the tables.

   It is used in removing the multi-valued attributes from the relations.

   it helps in connecting one table with others by using Foreign keys.

   It is used in maintaining the uniqueness of the data stored in the database.

   It helps in identifying the relationship between two or more tables.

Types of keys in a relational database:

   PRIMARY KEY: It helps in identifying each record uniquely due to which the redundancy of data can be minimized.

   FOREIGN KEY: It is a kind of referenced key that helps in making a relationship between two or more tables. It helps in fetching records by combining two or more tables with the help of different joins.

   SUPER KEY: It is a combination of two or more keys that can be selected as primary. It may contain those columns which have repeated values.

   COMPOUND KEY: It is a combination of those columns which may not be used independently as the identification of unique records but their combination does.

   CANDIDATE KEY: It is a kind of a super key that does not contain repeated records. A primary key can be chosen from candidate keys.

8 0
4 years ago
Other questions:
  • ____________ describes major components that comprise a system, their relationships, and the information the components exchange
    11·1 answer
  • Consider the following code segment: ArrayList bulbs = new ArrayList(); bulbs.add(new Light()); bulbs.remove(0); bulbs.add(new L
    15·2 answers
  • Which of the following statements about email is true?
    5·1 answer
  • 1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a s
    11·1 answer
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _​
    5·1 answer
  • what is hyperlink a)the text contained in hypertext documents b)a service provided by the internet c) the location of web pge on
    12·1 answer
  • Need help with these
    8·1 answer
  • CC stand for.....in the email platform?
    12·2 answers
  • Complete the following sentences with the correct form of the verbs in brackets.
    6·1 answer
  • People who are reading this:
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!