1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
14

Consider the following configuration. ​ Computer ""A"" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 ​ Computer ""B"" IP a

ddress: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?
Computers and Technology
1 answer:
denpristay [2]3 years ago
4 0

Answer:

There is nothing to change.

Explanation:

In the following configuration given in the problem, the necessary IP addresses and the subnet masks have been included in the configuration. The computers can be used to send and/or receive information to/from each other. The computers have been properly set-up and there is nothing to be done to the settings or configurations.

You might be interested in
____and___ are the two major techniques involved in green computing. //help \\
Rasek [7]
Virtualization and dynamics I think.
7 0
3 years ago
Which of the following is not an Operating System? (1 point)Windows
kobusy [5.1K]
The answers of the following are:

1.  The answer is Linux. It is not an Operating System.
2. Windows XP 2000 and Windows XP Home Edition have the same interface design. 
3. Linux is the operating systems which is considered to be open source.
4. Mac OS is an operating system which is considered to be the most popular with graphic and multimedia designers
5. The software programis the number and variety of programs available for a particular operating system.
4 0
3 years ago
What is a user data?
Rom4ik [11]

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

7 0
3 years ago
Write a program palindrome.py that prompts for a sequence of words or numbers on a single line and checks if the entries are pal
olya-2409 [2.1K]

Answer:

Explanation:

The program first asks the user for the sequence of words. Then it splits the sequence into an array of words. Then it loops through the array checking each word to see if it is a palindrome. If it is it prints the word, the boolean value, and adds 1 to the palindrome_count variable. Otherwise it prints the word, false, and moves on to the next word in the list. Finally, it prints out the total value of palindrome_count.

word = input("Enter sequence of words: ")

word_list = word.split(' ')

print(word_list)

palindrome_count = 0

for word in word_list:

   print('\n\n')

   reverse = word[::-1]

   if word == reverse:

       print(word, end='\n')

       print(True, end="\n")

       palindrome_count += 1

   else:

       print(word, end='\n')

       print(False, end='\n')

print("\n\nNumber of Palindromes in Sequence: " + str(palindrome_count))

3 0
3 years ago
Of the following, which would be the least important skill for an A/V technician to have? creative thinking interpersonal skills
kotykmax [81]

Answer:

C.self-defense skills

Explanation:

Just took the test

3 0
3 years ago
Other questions:
  • If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standa
    14·1 answer
  • How to write a program converting RGB to CMYK in python
    6·1 answer
  • students at a camp can choose between boating and fishing in the morning and between hiking and horseback riding in the afternoo
    11·1 answer
  • A Venn diagram is used to show...?<br> Plz help
    10·2 answers
  • The ---------------initiates a message by encoding theidea (or a thought) in words or symbols and sends it to areceiver.ChannelS
    10·1 answer
  • What is the duty of business to contribute to the well-being of society
    12·1 answer
  • Why is it a best practice of a remote access policy definition to require employees and users to fill in a separate VPN remote a
    14·1 answer
  • What is missing in this list of information needed to cite a book?
    7·1 answer
  • 3. Windows that are viewed as Web pages have<br> sections. **
    9·2 answers
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!