1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
6

A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.

1.210 subnet mask: 255.254.0.0 how should the subnet mask be configured so that the computer can communicate properly with all networking devices and other hosts on the network?
Computers and Technology
1 answer:
larisa [96]3 years ago
3 0
192.168 suggests class C networks which have a 24 bit netmask (255.255.255.0) but you haven't provided enough info, like the netmask of a working machine, to be definite.
You might be interested in
Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
Paladinen [302]

Respect others.

This means that it is important to make sure that your interactions with other internet users are based on respect for each other's resources. This includes time, bandwidth, and even emotions. Ensure that the information you are sharing is of value to the intended recipients and is sent in a timely manner. Treat other online users as you'd have them treat you.

Visualize your online conversations as you would real life conversations. Avoid being offensive and be accommodating of other peoples shortcomings. Also keep in mind who is part of the forum you are interacting with so as to use appropriate language. 



4 0
2 years ago
Do Y’all know how to view your answers to others people questions on your profile? Please answer fast
Pavlova-9 [17]

:Answer:first: <em>click on your profile you should see a little head after</em>, scroll all the way down u should see a <em>view proflie</em>-click on it after, u shoud see a <em>questions asked and questions answered</em>

<h2><em>hope this helped!!</em></h2>

Explanation:

5 0
2 years ago
How to print<br> 1<br> 321<br> 54321<br> 7654321<br> triangle pattern in python
krok68 [10]

Hope this helps, Upvote if you like it :)

6 0
2 years ago
What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation
Alekssandra [29.7K]

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

4 0
3 years ago
Match the context details with the pattern that applies.
tia_tia [17]

Answer:

1. - Observer

2. - iterator

3. - strategy

4. - composite

5. - decorator

Explanation:

An object contains other objects (elements) and must give access to them for clients, without exposing its internal structure. This is an observation.

The subject-object can generate events as an iterable (iterator) and could use different strategic algorithms to achieve a task. Class objects can be used to aggregate other class objects.

In python, the decorator function mimics the outer function of a nested function, but still maintains the functionality of the second function

6 0
2 years ago
Other questions:
  • What is the meaning for science?
    14·1 answer
  • A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.
    6·1 answer
  • How do you interpret field in contest of a DBMS?
    5·1 answer
  • My mac book airs touch pad stopped working and i can't click. what do i do?
    5·2 answers
  • The main parts of a lever are the....
    6·2 answers
  • laire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of t
    11·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    11·1 answer
  • List 10 examples of computer ethics<br>(please give even 1 if you can, I need it urgently) ​
    10·1 answer
  • What is game development​
    10·2 answers
  • How do you code to find the surface area 6 s2, volume s3 in python
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!