1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
10

What is the maximum number of hosts you can have on a network if the first decimal value of the ip address is between 192 and 22

3 and the subnet mask is 255.255.255.0?
Computers and Technology
1 answer:
Sergio [31]3 years ago
7 0
With CIDR (Common Internet Domain Routing), the first decimal number isn't important any more. The /24 netmask means that there's one octet (256) numbers that aren't part of the network number. The .0 address is the network number itself and .255 is the broadcast address of the network, so that leaves 254 available node numbers, but one of those has to be a router or else the machines can't communicate with other networks.
You might be interested in
Which statement is true?
Alexeev081 [22]

Answer:

Bjarne Stroustrop published the first reference guide for C++

Explanation:

Bjarne Stroustrop is a computer scientist who created the C++ programming language while working at the AT&T Bell laboratory. He also published the first reference guide for the programming language.

In October 1985, the book, The C++ Programming Language, was published. It describes the c++ programming language and was the only documentation and reference guide for the programming language at the time. Newer editions have since been published.

7 0
3 years ago
Read 2 more answers
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
A related database stores data in the form of______
avanturin [10]

Answer:

Lists.

Explanation:

A relational database stores data in the form of lists.

6 0
2 years ago
The component that allows you to make a paper-based copy of a body of text is the _____.
ANTONII [103]
The correct answer is: Scanner

The scanner is a piece of technology which unlike the printer is an input device which basically scans the top-view of any flat surface (usually paper but is definitely not limited to it) introduced in its effective range using light. The data scanned is then transfered to the Central Processing Unit for futher processing. The processed image can then be outputted and seen on the monitor's display. Once available for printing, the Central Processing Unit will just send the processed image into the printer ad voila, your scanned image is now printed in a piece of paper!

Today, scanners come with printers as a bundle. It is a perfect combination since the printer will just print the image anyway.
5 0
3 years ago
In Python which is the correct method to load a module math?
Wittaler [7]

Answer: The math module is a standard module in Python and is always available. To use mathematical functions under this module, you have to import the module using import math .

Explanation:

3 0
2 years ago
Other questions:
  • Which of the following functions and expressions will convert the ASCII character "Z" to its numeric equivalent ASCII code?
    7·1 answer
  • In an advanced word processing program which type of image or graphic is available in a variety of formats and styles?
    12·2 answers
  • T/F The two primary sections of the CPU are the arithmetic/logic unit and the control unit
    8·1 answer
  • How do you read a column
    8·1 answer
  • What is the purpose for adding images and graphics to a web page?
    5·1 answer
  • Please write a Java program.
    8·1 answer
  • The order of precedence is very important when building formulas in Excel. Which of the following formulas will produce 778 as t
    11·1 answer
  • Every command or instruction is called
    8·2 answers
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • ____ characterized the period now known a Web 1. 0. Augmented reality
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!