1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
7

The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is

Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
6 0
164.109.0.0/17




-------------------------------------------
You might be interested in
Classify the given items as belonging to the public domain or protected by copyright law.
max2010maxim [7]

Anything protected by the copyright law has a legal concept that grants artists or authors control over their creations. On the other hand, anything in the public domain is not protected by intellectual property laws and the public owns these works.

A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

3 0
3 years ago
Read 2 more answers
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Write a program to enter 30 integer numbers into an array and display​
Rama09 [41]

Answer:

i764

Explanation:

3 0
3 years ago
Read 2 more answers
You can use pen and highlighter tools to emphasize information on a slide during a PowerPoint presentation. These tools are avai
11111nata11111 [884]
C. slide show toolbar

7 0
3 years ago
What are the elements of a good study environment? Check all that apply.
finlep [7]

The elements of a good study environment are that it must be well lit the resources are near it is quite and it is clutter free

Explanation:

A good study environment must be an environment that will promote the good study conditions and it must be quite and calm if a person studies in that environment all the resources like the food water and the other refreshments must be available in that environment

The environment must be clean and it must be clutter free without any disturbances and hence these are the factors that will promote the good study environment

3 0
3 years ago
Read 2 more answers
Other questions:
  • Want is the assignmment
    8·1 answer
  • What is industry 4.0 -automation revolution-, what is your opinion about the direction this revolution is taking the industry in
    8·1 answer
  • Write a for loop to verify that your function is correctly returning the expected output for the radius values between 0 and 11.
    14·1 answer
  • True or false? A medical assistant can check for available exam rooms and providers using an electronic scheduling system.
    8·1 answer
  • Complete the following table.
    6·1 answer
  • What is the main component of the EV3 Lego Robot called?​
    6·1 answer
  • What<br>are<br>the features of secondary storage media​
    13·2 answers
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • You have a passage of text that needs to be typed out, but some of the letter keys on your keyboard are broken! You're given an
    14·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!