1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
7

You have an interface on a router with the ip address in the class c network subnet of 192.168.192.10/29. how many total host ad

dresses can exist on the subnet of the lan attached to this router's interface? 62 8 30 6
Computers and Technology
1 answer:
Gemiola [76]3 years ago
8 0
If 29 bits of the 32 available addressing bits are used for the subnet, then only 3 bits giving 2^3=8 combinations remain for the host addresses. 

In reality, the all zeros and all ones addresses are reserved. So, 8 addresses can exist, but 6 of those are available.

The way the question is formulated it seems the answer 8 is what they're after.
You might be interested in
How do you put a voice password on your computer using windows 10
valkas [14]
I think you need some time of camra voice recorder sorry if im wrong also sorry cuz i forgot what it is called
7 0
2 years ago
Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
rosijanka [135]

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

4 0
3 years ago
Ladders are a fundamental piece of equipment on construction sites and employers are expected to ensure that workers follow safe
Ede4ka [16]
That statement is true.

Ladders commonly used to do a couple of construction activities in a higher region of a building or area.
If this equipment is not used properly, it could potentially caused  fatal accidents for the people on the site
6 0
3 years ago
Which of the following operating systems includes a virtual assistant?<br> Group of answer choices
Anna [14]

Complete Question:

Which of the following operating systems includes a virtual assistant?

Group of answer choices

a. macOS

b. Linux

c. UNIX

d. Chrome OS

Answer:

a. macOS

Explanation:

Macintosh refers to a set of computers designed, developed and manufactured by Apple Inc. Apple officially began the sales of Macintosh on the 24th of January, 1984. The first designs of Macintosh are considered to be personal computers and had a mouse, in-built screen with a graphical user interface (GUI). The operating system designed and developed for Apple computers (MacBook) is known as macOS (Macintosh operating system).

A virtual assistant can be defined as a computer software program that is artificially intelligent to understand human voice commands and performs task for the end user based on instructions or commands.

Generally, macOS is an operating system that includes a virtual assistant referred to as Siri. Siri was developed and released by Apple on the 4th of October, 2011.

<em>Siri as a virtual assistant, is able to perform tasks such as setting reminders, scheduling events, media player controls, GPS navigation, internet search, answer some questions etc. </em>

3 0
2 years ago
While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one:
Olin [163]

Answer: True

Explanation: Because anyone can post something and it can be non reliable

7 0
3 years ago
Other questions:
  • The act of engaging in crime through the use of a computer or similar type of device is called:
    8·1 answer
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • Which of these networks is primarily for posting and viewing photos?
    8·2 answers
  • Which is better analog music or digital music
    15·2 answers
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    15·1 answer
  • Which type of password would be considered secure
    5·2 answers
  • <img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bx%7D%7B1%20%2B%20x%7D%20%20%2B%20%20%5Cfrac%7Bx%20%2B%201%7D%7Bx%7D%20%20%3D%20%2
    15·2 answers
  • Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a
    6·1 answer
  • Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
    14·1 answer
  • The term information technology was first used what year?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!