1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
8

You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets. 1. What class is this address

Computers and Technology
1 answer:
Korvikt [17]3 years ago
8 0

Answer:

This address is by default a class c network

Explanation:

This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary.  If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.

You might be interested in
The person in charge of recording the sound should always
lubasha [3.4K]
I’d say wear headphones but I agree with the previous answer which said most of them could be necessary
8 0
4 years ago
I still need help, thank you! Will give Brainliest ​
wlad13 [49]

Answer: 1 what do u think to help u

6 0
3 years ago
Since the web.xml file describes how the web application should be configured when it is deployed on a server, the file is known
HACTEHA [7]
The answer is:<span>deployment descriptor (DD)</span>
5 0
3 years ago
________an approach to database and software development that emphasizes "individuals and interactions over processes and tools,
dimulka [17.4K]

Answer:

Agile software development

Explanation:

Agile software development  model is a blend of iterative and steady procedure models with center around process flexibility and consumer loyalty by fast conveyance of working programming item. Nimble Methods break the item into little gradual forms. These assembles are given in emphases.

So in blank space there will be Agile software development

7 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
Other questions:
  • Write a class called Product. The class should have fields called name, amount, and price, holding the product’s name, the numbe
    8·1 answer
  • The keyboard preferences pane includes a list of keyboard shortcuts.
    8·1 answer
  • What does a shutter speed of one mean?
    14·2 answers
  • Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
    8·1 answer
  • Get someone get her for me if need snap kell.c11
    10·1 answer
  • Please help!! i need this asap &lt;3 <br> (the boxes have the same answer choices in both)
    7·2 answers
  • The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
    8·1 answer
  • Which example best demonstrates an impact of computers on health care?
    14·2 answers
  • Which of the following safety and privacy features is not included in a P2P app or service?
    5·2 answers
  • When there is a missing DLL file, _______.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!