answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
2 years ago
11

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. what is the network address and subne

t mask of the second useable subnet?
Computers and Technology
1 answer:
Vitek1552 [10]2 years ago
8 0
<span>There is a total of 32 bits in </span>IPv4 address space. In this case we have /24, which means <span>that 24 bits are contained in the network. So, the </span><span>
subnetwork  is 192.168.1.64
subnet mask 255.255.255.192</span>
You might be interested in
An mp3 takes up about 16 kilobytes of memory per second of music. if you owned a one terabyte hard drive and filled it with only
xxTIMURxx [149]

60 sec. = 1 min. 3,600 sec = 1 hr. (60 sec x 60 minutes) 86,400 sec= 24 hr. (3,600 x 24) Given : 16,000 (bytes per seconds, for mp3 ) 86,400 X 16,000 = 1,382,400,000 bytes for 24 hrs. 1,382,400,000 = 1,382.4 mega bytes (Mb.) for 24 hrs of music Looking for how many days are in 1,000,000 Mb. 1,000,000 / 1,382.4 = 723.379629 Days worth of music.


8 0
2 years ago
_____ computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, wh
tensa zangetsu [6.8K]

Answer:

b. Contextual computing

Explanation:

Contextual computing -

In this method of computing , the hardware and the software collect and examine the data all by itself from the near by areas in order to make it presentable , is known as the method of contextual computing .

It is also known as the context - aware computing .

Hence , from the given information of the question , the correct term from the given options is b. Contextual computing .

4 0
2 years ago
Sean is forecasting the time and cost of developing a customized software program by looking at the number of inputs, outputs, i
Gwar [14]

Sean is using FUNCTION POINT (d) method for forecasting the time and cost of developing a customized software program by looking at the number of inputs, outputs, inquiries, files, and interfaces.

Explanation:

  • The function point is a "unit of measurement" to express the amount of business functionality an information system (as a product) provides to a user.
  • The outcome of a function point count provides the metric 'unit of software delivered' and can be used to assist in the management and control of software development, customisation or major enhancements from early project planning phases, through to the ongoing support of the application.

6 0
2 years ago
Make a class Employee with a name and salary. Make a class Manager inherit from Employee. Add an instance variable, named depart
sweet [91]

Answer:

see explaination

Explanation:

class Employee

{

String name;

double salary;

void tostring()

{

System.out.println("Employee:\nName: "+name+"\nSalary: "+salary+"\n");

}

Employee(String n,double s)

{

name=n;

salary=s;

}

}

class Manager extends Employee

{

String department;

void tostring()

{

System.out.println("Manager:\nName: "+name+"\nDepartment: "+department+"\nSalary: "+salary+"\n");

}

Manager(String n,double s,String d)

{

super(n,s);

department=d;

}

}

class Executive extends Manager

{

void tostring()

{

System.out.println("Executive:\nName: "+name+"\nDepartment: "+department+"\nSalary: "+salary+"\n");

}

Executive(String n,double s,String d)

{

super(n,s,d);

}

}

public class test

{

public static void main(String args[])

{

Employee e =new Employee("Neo",12000);

e.tostring();

Manager m =new Manager("Cramster",100000,"Homework");

m.tostring();

Executive ex =new Executive("Chuks",1000000,"Homework");

ex.tostring();

}

}

8 0
2 years ago
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
2 years ago
Other questions:
  • Write a method named quarterstodollars. the method should accept an int argument that is a number of quarters, and return the eq
    13·2 answers
  • How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
    5·1 answer
  • Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
    9·2 answers
  • Using evidence to dispel myths or false beliefs is one way to move closer to evidence-based practice. Please select the best ans
    13·2 answers
  • The ________ method is based on simple arithmetic. The process involves dividing the bits of a frame into equal segments, adding
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • A form that dedicates a page for each item retrieved for a case; it allows investigators to add more detail about exactly what w
    10·1 answer
  • The following checksum formula is widely used by banks and credit card companies to validate legal account numbers: d0 + f(d1) +
    13·1 answer
  • Assume that the following method header is for a method in class A. public void displayValue(int value) Assume that the followin
    11·1 answer
  • Consider the following code segment, which is intended to create and initialize the two-dimensional (2D) integer array num so th
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!