1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
14

Consider the following configuration. ​ Computer ""A"" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 ​ Computer ""B"" IP a

ddress: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?
Computers and Technology
1 answer:
denpristay [2]3 years ago
4 0

Answer:

There is nothing to change.

Explanation:

In the following configuration given in the problem, the necessary IP addresses and the subnet masks have been included in the configuration. The computers can be used to send and/or receive information to/from each other. The computers have been properly set-up and there is nothing to be done to the settings or configurations.

You might be interested in
Which of these are characteristics of compiler software? Check all of the boxes that apply. Compiler software compiles code. Com
Feliz [49]

Answer:compiler software translatesthe code into machine language

Explanation:

6 0
3 years ago
Read 2 more answers
Explain the need for data structures when developing software.
Sergio [31]

Solution:

It is  important because, it has to do operation on so without, data structures and algorithms.

It performs these operation:  

 1)Take an input

2) Process it  

3) Give back the output.

The input can be in any form, for ex while searching for directions on google maps,  the starting point and the destination as input to google maps, while logging in to any social sites, We have to give our email and password as input and so on.

Similarly, in the third step, the computer application gives us output in some form or the other.

To make this process efficient, we need to optimize all the three steps.

4 0
3 years ago
Andrew has data in cell E14 and the cell should be blank. Andrew should _____.
denpristay [2]
Use the mouse to click on cell E14 and press delete
4 0
3 years ago
Read 2 more answers
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
1 year ago
A*=++a/6+b++ 3 if a=3,b=4​
Vinil7 [7]

Answer:

a=22.5

Explanation:

Given

a*=++a/6+b++3

Required

The result when a=3 and b=4

Analyzing the given instruction

a*=(++a)/(6)+(b++3)

Single out and solve the expressions in bracket

(++a) = a -- When the ++ operator appears before an operand, it is called pre increment. meaning that the operation will be done before the operand will be incremented.

So: in this case: ++a = a

b++3 = b + 3

The operator, as used in that statement is the same as: b + 3.

So:

a*=(++a)/(6)+(b++3)

a*=(a)/(6)+(b+3)

a*=(3)/(6)+(4+3)

a*=0.5+7

a*=7.5

The above expression is calculated as:

a=a*7.5

So:

a=3*7.5

a=22.5

8 0
3 years ago
Other questions:
  • Which social networking function came first?
    9·2 answers
  • Brian wants to conduct an online search using a certain phrase he intends to use the word books that belong to the 1800's in his
    8·1 answer
  • Describe how computer is in the last 35 years
    6·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • g Define memory hierarchy. A. The rate at which information can be transferred from one place to another. B. Ordering storage sy
    8·1 answer
  • What is the FaFASA4caster used for
    10·1 answer
  • D is the correct answer
    8·2 answers
  • JAVA NEED HELP ASAP
    7·1 answer
  • Please I need help.
    12·1 answer
  • Most of the internal operations in a computer use hexagonal numbering true or false
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!