1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
10

Range of IP address that anyone can use for their internal network are known as

Computers and Technology
1 answer:
Ludmilka [50]3 years ago
4 0
Range of IP address that anyone can use for their internal network are known as  <span>private IP addresses.  The public IP addresses on the other hand are public and can not be used within a home or business network.

</span>

The Internet Assigned Numbers Authority (IANA) reserves the following IP address blocks for use as private IP addresses:

<span><span>10.0.0.0 to 10.255.255.255
</span><span>172.16.0.0 to 172.31.255.255</span><span>
192.168.0.0 to 192.168.255.255</span></span>
You might be interested in
If an image has only 4 colors, how many bits are necessary to represent one pixel’s color? Describe a new custom encoding that u
MakcuM [25]

Answer:

1) 2 bits 2) shown in explanation 3) shown in explanation 4) 22 bits per pixel (2.75 bytes)

Explanation:

As a bit is one of two states, 1 or 0, 2 bits is sufficient to represent 4 colors:

00 = color 1

01 = color 2,

10 = color 3,

11 = color 4

This would be the custom type of encoding for that specific image as it only uses 4 colors.

Now to calculate the amount of memory saved, which is quite simple:

24-2=22

So you Would save 22 bits per pixel or 2.75 bytes per pixel.

5 0
3 years ago
3. In 1989, the first handheld console was released by _____ and it was called ________.
beks73 [17]
Answer: b) Nintendo, Game Boy

In 1989, the first handheld console was released by _Nintendo_ and it was called _Game Boy_.
5 0
3 years ago
Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jack
lyudmila [28]

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

<h3>What is a system hack?</h3>

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

3 0
2 years ago
Who knows a website to learn how to code in java?
Murrr4er [49]
Simple...

Although we are not allowed to link in websites..(against guidelines) you can search up codeacademy, this is a place to learn to code.

Thus, your answer.
6 0
3 years ago
Before using your Twitter account to market your personal brand, you should evaluate Your profile picture Your bio Your tweets A
AnnZ [28]
D. All of the Above.

If you are using a Twitter account for marketing your personal brand, you certainly should evaluate your entire profile, which includes your pictures, bio and tweets.  
5 0
3 years ago
Other questions:
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • The bluecross blueshield federal employee program (fep) is a(n) __________ health benefits program established by an act of cong
    8·1 answer
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • Select the variable that illustrates the ratio scale of measurement. (a) gender (b) weight (c) political party affiliation (c) r
    13·1 answer
  • What type of system is associated with weather that has lots of clouds and thunderstorms with the possibility of tornadoes?
    10·1 answer
  • What is the best way of transmitting data safely
    9·1 answer
  • Moving images of real event​
    12·2 answers
  • Blockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every indus
    13·1 answer
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!