Answer / Explanation:
195.200.0.0/16
Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.
2ⁿ = number of subnets
where n is additional bits borrowed from the host portion.
2ˣ - 2 = number of hosts
where x represent bits for the host portion.
Assuming we have 195.200.0.0/25 
In the last octet, we have one bit for the network
number of subnets  = 2¹  =2 network addresses  
number of host = 2⁷ - 2= 126 network addresses per subnets
 
        
             
        
        
        
Answer:
Communication is a constant process and it can also be corrupted.
Explanation:
Communication is the ability to send and receive messages that can be understood. We constantly communicate with our environment verbally and or orally, using signs and language to express ourselves.
Messages sent can and should be decoded for communication to be complete. It can be corrupted on its path to the decoder, this hinders understanding.
 
        
             
        
        
        
Answer:
An IDE normally consists of a source e editor, build automation tools. Most modern IDEs have intelligent code completion. Some IDEs contain a compiler, interpreter, or both.
 
        
             
        
        
        
Answer:
userInput = input("Please enter a string of words ")
userInput.split ()
for item in userInput.split ():
    if item =="darn":
        print("Censored")
        break
else:
    print(userInput)
Explanation:
Using Python programming language, the input function is used to receive the users input and save in a variable userInput
Then the .split method is used to convert the words into a list of words.
Using a for loop, the code checks for the word darn and prints censored if it exists else it prints the userInput
 
        
             
        
        
        
The answer to this question is A