1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
2 years ago
5

What defines which part of the IP address is the Network ID and the Host ID?

Computers and Technology
2 answers:
Lelechka [254]2 years ago
6 0
Subnet mask

Verified
Brilliant_brown [7]2 years ago
5 0

Answer:

Subnet Mask

Explanation:

Literally the answer.

You might be interested in
How to ask for a letter of recommendation via email?
Katarina [22]
This can be done in a number of steps.

1. Prepare your email request early.
2. Choose an appropriate professor
3. Address the letter properly.
4. Put "Recommendation for [your name]" as the subject line.
5. Start the first paragraph by stating what you want.
6. Outline your relationship with the professor.
7. Use the third paragraph as an opportunity to hint at what you'd like the professor to say about you.
8. Give the details.
9. Close with information about how you will follow-up.
10. Thank the professor, whether or not s/he writes the letter.
11. Follow through as promised by delivering necessary materials and sending a reminder
12. Take responsibility for checking with the scholarship program, graduate school, or prospective employer before the deadline
1. Thank the professor again.
5 0
3 years ago
Rocks created from compaction and cementation of sediments are called:
Effectus [21]

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

4 0
3 years ago
How does theatre compare with movies or television? What makes it similar to movies and television? What makes it different?
givi [52]

Answer:

you cant mess up in theatre but you can redo scences in movies, thay both have acting in them

Explanation:

im a theatre person

3 0
3 years ago
According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
nadya68 [22]

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

8 0
3 years ago
Read 2 more answers
________ is a hybrid version of Ethernet that uses either 10Base-T, 100Base-T, or 1000Base-T.
Vladimir79 [104]

Answer: ANSWER is B I'm pretty sure

Explanation: hope this help

s :)

7 0
3 years ago
Other questions:
  • What was the first browser that allowed for graphics to be viewed on the web?
    14·2 answers
  • In Python,The sum of the elements in a tuple can be recusively calculated as follows:The sum of the elements in a tuple of size
    5·1 answer
  • Help please brainliest
    8·1 answer
  • What is the correct order of headers, from left to right, in a completed frame?
    8·1 answer
  • In a flashdisk wich icon can you use to open files in computer​
    5·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    12·2 answers
  • If you copy and paste from someone else's document (such as a website, a friend's paper, an instructor's solutions manual, etc.)
    15·1 answer
  • What type of technology we need to use in order to make sure that users can freely room from one room to another one without wi-
    14·1 answer
  • Find the output<br>I need it immediately​
    15·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!