1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
4 years ago
10

How can you tell if an ip address is public or private?

Computers and Technology
1 answer:
vampirchik [111]4 years ago
7 0

Answer:

by the IP address range

Explanation:

Range from 10.0.0.0 to 10.255.255.255 — a 10.0.0.0 network with a 255.0.0.0 or an /8 (8-bit) mask

Range from 172.16.0.0 to 172.31.255.255 — a 172.16.0.0 network with a 255.240.0.0 (or a 12-bit) mask

A 192.168.0.0 to 192.168.255.255 range, which is a 192.168.0.0 network masked by 255.255.0.0 or /16

A special range 100.64.0.0 to 100.127.255.255 with a 255.192.0.0 or /10 network mask; this subnet is recommended according to rfc6598 for use as an address pool for CGN (Carrier-Grade NAT)

these are private IP addresses, any other address is public

You might be interested in
Whats the task of one of the computers in network called?
pentagon [3]
The answer that’s gonna be followed is a:hardware server I’m sure
3 0
3 years ago
Read 2 more answers
Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?
vlabodo [156]
Công nghệ đã thay đổi cách mọi người sử dụng để giao tiếp ở nơi làm việc hiện đại
6 0
3 years ago
An asterisk (*) following a cell reference in a formula is the arithmetic operator that directs excel to perform the division op
lubasha [3.4K]
You are correct there. the * operand tells Excel to multiple the two cells or variables.
7 0
4 years ago
It's so eazy
Dmitrij [34]

Answer:

  1. true
  2. true
  3. false
  4. true
  5. true
4 0
3 years ago
Read 2 more answers
How to check iready minutes when i cannot log into iready
Alekssandra [29.7K]

Answer:

If you are the host of the iready like a teacher then you should be able to see how much time you have left. If not you should probably ask them.

Explanation:

3 0
3 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • Computer science
    6·1 answer
  • How to do “Pseudocode” and “FlowChart” in this question ? <br><br> Please Help mee
    9·1 answer
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • Ram is also called __________________________________________________
    11·1 answer
  • Which of the following is not a Nintendo game character?
    6·2 answers
  • Value of 3.0+4.0×6.0​
    14·1 answer
  • Explain how to utilize the computer in rooms management.​
    13·1 answer
  • Gta? 5 or gta 4? orrrr gta 3? what do you think?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!