1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
6

How many host ip addresses are available on a network with a subnet mask of 255.255.255.192?

Computers and Technology
1 answer:
elena-s [515]3 years ago
5 0
62






------------------------------------------------------------
You might be interested in
8.5 question 2 edhesive
dangina [55]

Answer:

Please check the attachment.

Explanation:

Please check the attachment for the program in python.

Download txt
5 0
3 years ago
What is Activation code for wwe 2k20 ​
Arte-miy333 [17]
Shouldn’t you get that in your email when you sign up.
5 0
3 years ago
Read 2 more answers
A colleague has included you on an email that is irrelevant to you, but it continues to come to your inbox because people are us
Law Incorporation [45]

on google there is a mute function with the 3 dots on the top and outlook has it in the same location but under the word of "ignore"

7 0
3 years ago
What is an example of an Experience component within an enterprise platform?​
Alisiya [41]

Answer:

A

Explanation:

A system used for processing customer payments. A tool used to coordinate recruitment of new employees. A mobile app used by customers to place orders.

6 0
3 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
3 years ago
Other questions:
  • is this website just for a bunch of lazy kids bumming off answers? Because if that were the case I'd be one of them.
    9·1 answer
  • Why is it important to use proper line types
    13·1 answer
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • I have a problem with Instagram.
    11·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • Who made the first sandwich?
    5·2 answers
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • Software that requires excessive disk space or memory.
    15·1 answer
  • Suppose that you have the following declaration:
    7·1 answer
  • How do I add a Child to my Brainly account
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!