1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
10

PLS HELPPPPP ILL REALLY APPRECIATE IT!!

Computers and Technology
1 answer:
lyudmila [28]3 years ago
3 0

<em>Answer:</em>

<em>The first option.</em>

You might be interested in
Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n
Jobisdone [24]

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

8 0
4 years ago
The __________ web site and list site seclists.org is home to the leading free network exploration tool, nmap.
maksim [4K]
The nmap.org website

Nmap is an open source utility for security auditing and network discovery. Many network admins also use it for networks inventory and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network.


8 0
3 years ago
Read 2 more answers
Tell me dynamo is easily charge 12 v battery if dc motor is 100w in electric cycle?
givi [52]
It depends on how you assemble the solar panel  you have to have at lest a 10 v's going in to the battery. 
4 0
3 years ago
To which type of server will you transfer resources so that your colleagues cam aslo use them ?
Alborosie
Google drive or Dropbox. Services like that.
7 0
4 years ago
One hallmark of good strategic design is supporting a variety of gameplay styles and different ways to achieve victory.
Nonamiya [84]
It creates the illusion of creating a original path, so its true
3 0
4 years ago
Other questions:
  • You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has d
    15·1 answer
  • Describe the four techniques mentioned in the article that help you, the speaker, keep your audience engaged
    9·1 answer
  • __________ refers to the idea that eachemployee should report
    14·1 answer
  • Which of the following emerging technologies uses the principle of chromosomes to identify suspects?
    10·1 answer
  • When computing the cost of the basket of goods and services purchased by a typical consumer, which of the following changes from
    11·1 answer
  • Anyone got the edmentum computer programming post test answers?
    6·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    8·1 answer
  • The suffix of a web address denotes which type of organization it is affiliated with. For example, an .edu is what type of websi
    9·1 answer
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
  • Explain input device​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!