1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
7

The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is

Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
6 0
164.109.0.0/17




-------------------------------------------
You might be interested in
What is one way a senior employee can mentor a new employee? Give orders about what to do and what not to do Gossip about which
den301095 [7]

A good way for a senior employee to mentor a new employee is to share company knowledge and job expertise.

7 0
3 years ago
_______medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated wi
KiRa [710]

Answer:

The answer is Magnetic

Explanation:

Magnetic medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.

Magnetic based drives, for example:- Hard disk. Floppy Disk. Magnetic tape.

Optical based drives, for example:- CD drive (ROM and RW) DVD drive (RPM and RW)

Flash or solid state chip based drives, for example:- USB drive. SD cards.

7 0
3 years ago
When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the c
MariettaO [177]

Answer:

A short

Explanation:

A short in electrical terms is an abbreviation for a short circuit. This generally means that there is an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected together causing the cable to fail.

8 0
4 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Other questions:
  • Which is the most visual social media site?
    6·1 answer
  • 40 points to answer ALL
    9·2 answers
  • Which one of them are the correct answers?
    7·1 answer
  • The ____________ deals with the well-being of the EMT, career progression, and EMT compensation. Select one: A. EMS administrato
    9·1 answer
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • The word “Intrapersonal”means----------------------.Within the personSelf talkExtrovertOutgoing person
    10·2 answers
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • What will be the results from running the following code?
    5·1 answer
  • Which of the following is the best example of an installation issue
    11·2 answers
  • PLEASE HELP
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!