Answer:
C. 220.100.100.45 to 220.100.100.46
Explanation:
The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.
The useable host IP addresses are gotten from the formula '
-2', with n=2 bits.
useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.
While the 12th subnet is 12 x 2^2 = 44.
This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.
TRUE
Psychodynamic theories are usually too vague to allow a
clear scientific test. Modest support for central psychodynamic hypotheses has
been provided by Empirical studies. Critics have in the past disputed very many
aspects of psychoanalysis including whether it is indeed a science or not.
However much this is so, psychoanalysis is a great idea in personality that
should never be overlooked.
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
<u>Explanation:</u>
<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.
a. Cindy may learn the difference between these two techniques used to create a malware attack:
- through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
- through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.
b. Here are some common suggestions;
- Never open attachments from strange email addresses.
- install a paid antivirus software.
- be mindful of websites with too many ads.
<span>Open source software is usually free to download and install, and it can be studied, changed, and distributed according to the rights of the software. I don't believe there is any copyright laws on this type of software. The most known open source software is Linux and it's available for most operating systems right now. Typically, open source owners just ask for donations for their work.</span>