1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
14

What is the maximum number of ip addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet

mask?
Computers and Technology
1 answer:
FinnZ [79.3K]3 years ago
7 0
30 including the router.
You might be interested in
Banks and other financial service companies offer many types of accounts for client's to invest their fund-- every one of them h
monitta

Answer:

//Abstract class declaration of Account

public abstract class Account{

   

   //nextId initialized to 10001

   private static int nextId = 10001;

   private int id;

   private String name;

   // constructor with one argument

   public Account(String passName){

       name = passName;

       //assign the value of nextId to id

       id = nextId;

       //nextId is incremented

       nextId++;

   }

   // accessor method to return id

   public int getId(){

       return id;

   }

   // accessor method to return name

   public String getName(){

       return name;

   }

   //abstract method that return object of type Cash

   //It is not implemented here.

   //It will be overriden and implemented by concrete subclassed

   public abstract Cash getValue();

}

Explanation:

The abstract class Account is defined with the keyword abstract. Then inside the class, we declared and initialized an integer static variable nextId, an instance variable id and a String instance variable name.

A constructor is then defined which accept one argument of a string passName.

Two accessor methods getId and getName are declared. getId return an integer id, while getName return a string name.

Finally, an abstract method getValue is declared with no implementation and it return an object of type Cash.

6 0
4 years ago
What command do you use to increase or decrease the view of a selected cell or range of cells to fill the excel window area for
kap26 [50]

Zoom to selection is the command that should be used to increase or decrease the view of a selected cell or range of cells to fill the excel window area for better visibility

I hope this will help you.

7 0
3 years ago
All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____. Group
Len [333]

Complete Question:

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____.

Group of answer choices.

A. OLE DB

B. ODBC

C. SQL Server

D. Access

Answer:

D. Access

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Some examples of data providers included with .NET for accessing and manipulating data in databases are;

A. OLE DB: this is an acronym for Object Linking and Embedding Database. OLE DB was designed and developed by Microsoft corporation and it comprises of various application programming interfaces (APIs) used for data access.

B. ODBC: it is an acronym for Open Database Connectivity and it was designed and developed by Microsoft corporation used for data access through structured query language (SQL).

C. SQL Server: it is a domain-specific language server designed and developed for managing the various data saved in a relational or structured database.

3 0
3 years ago
The main advantage of using the Gray code is:
zzz [600]

Answer:

a) only one digit changes as the number increases.

Explanation:

Let us first understand what does it mean when we say only one digit changes as the number increases using the Reflected Binary code (also called Gray code)

consider the 4 bit representation of Binary coded decimal and RB codes

Decimal | Binary code  | Reflected binary (RB) code

0              0000               0000

1               0001                0001

2              0010                0011

3              0011                 0010

4              0100                0110

5              0101                 0111

As you can see in the case of binary codes, there are more than one digit changes between two consecutive numbers.

But notice that in the case of Gray codes, there is always one digit change between two consecutive numbers.

The problem with the binary codes is that the more digits change there states the greater is the chance of ending up with random transitional values rather than real values which can be incorrect. The RB code solves this problem by only changing one digit at a time.

The RB code is widely used in linear and rotary encoders, error correction and digital logic design.

8 0
3 years ago
Duplicate data in multiple data files is called data ________.
astraxan [27]
It is called extension process of data <span />
6 0
4 years ago
Other questions:
  • You receive an offer for a credit card that can be use to accrue points that
    11·1 answer
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • Consider the following relation: CAR_SALE (Car#, Date_sold, Salesman#, Commision%, Discount_amt Assume that a car may be sold by
    15·1 answer
  • What element is used to configure a new paragraph?
    9·1 answer
  • Without any formal planning, the president of a software company remarks in a speech that new technologically advanced software
    12·1 answer
  • Analyze the following recursive method and indicate which of the following will be true.
    7·1 answer
  • How does this happen on brainly????
    12·2 answers
  • What is the system of computers, routers, wires, cables,etc. that allow computers to communicate called?
    11·1 answer
  • Write about how this item was important to you.
    9·1 answer
  • 84.6% complete question a network administrator is installing a device that uses redundant array of independent disks (raid) tec
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!