1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
8

Your organization network diagram is shown in the figure below. Your company has the class C address range of 199.11.33.0. You n

eed to subnet the address into three subnets and make the best use of the available address space. Which of the following represents the addressing scheme you would apply to the New York office and Toronto Office?
(A) 199.11.33.160/31
(B) 199.11.33.0/25
(C) 199.11.33.128/27
(D) 199.11.33.0/31
(E) 199.11.33.160/30
(F) 199.11.33.128/28

Computers and Technology
1 answer:
user100 [1]3 years ago
6 0

Answer:

aaaa

Explanation:

You might be interested in
Which are the common database operations that can help organize data for easy retrieval?
Dima020 [189]

There are two common types for data access or retrieval

1. Sequential access is the main access mode only in batch systems, whereas files are used and updated at regular intervals.

2. Direct access - on-line processing requires direct access, whereby a record can be accessed without accessing the records between it and beginning of the file.

7 0
4 years ago
How to disappear completely from the internet pc magazine
GREYUIT [131]

In order to disappear completely from the internet, one needs to delete their social media accounts, delete their emails, etc.

The internet is a network of interconnected computer systems. Despite its numerous advantages, it also has several disadvantages and there are some moments when we want to disappear from the internet.

The steps that are needed to disappear from the internet include:

  • Delete your social network accounts.
  • Delete your email accounts.
  • Use search engines to track your old activities online and delete them.
  • Falsify the accounts that can't be deleted.
  • Unsubscribe from mailing lists.

Read related link on:

brainly.com/question/24902823

4 0
3 years ago
Whichof the following is not a standard method called as part of the JSPlife cycle?jspInit()jspService()_jspService()jspDestroy(
olga nikolaevna [1]

Answer:

jspService()

Explanation:

These are the steps in JSP life cycle-

1. We have to convert JSP page to Servlet.

2.Then we compile the JSP page which convert it into test.java

3. In test.java ,we load the classes(test.class) in container.

4. Object(instance) is created in container .

5. Then, we initialize the init() method at the time of servlet generation.  

6. After the initialization,for the requests we use _jspService() method to serve the incoming requests from JSP.

7. When the work of JSP is completed, we remove it from container by the help of jspDestroy() method.

There is no jspService() method in the JSP life cycle.

7 0
3 years ago
If you want to design computing components for cars and medical
Marysya12 [62]

Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

<h3>What Is Computer Engineering?</h3>

Computer Engineering is known to be one filed that is made up of the fields of electrical engineering and also that of computer science to form new kind of system hardware or software.

Based on the above, Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

Learn more about Computer engineering from

brainly.com/question/24181398

#SPJ1

4 0
2 years ago
The dates of Spring Break should be included on your weekly calendar. Please select the best answer from the choices provided T
vivado [14]
False i hope that this helps you ! (:
3 0
4 years ago
Read 2 more answers
Other questions:
  • 1. Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
    15·2 answers
  • Qu'est-ce qui motive le choix d'une autre?
    7·1 answer
  • Which NSX feature would enhance their security so that this doesn’t happen again?
    15·1 answer
  • A contact list is a place where you can store a specific contact with other associated information such as a phone number, email
    8·1 answer
  • With his assembly lines, Henry Ford improved what process? A. computer management B. just-in-time management C. Bessemer process
    5·1 answer
  • How many cells are included in the range A1:B3
    10·1 answer
  • A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en
    14·1 answer
  • What font family is Times New Roman an what font family is Arial?
    9·2 answers
  • The document that is use in excel to store an work with data that's formatted in a pattern of a uniformly space horizontalal an
    12·1 answer
  • Which statement best describes network security?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!