You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192.168.1.33. Both PCs receivces a subnet mask of 255.255.255.240A) what is network address of PC-A?B) what is network address of PC-B?C) will these PCs be able to communicate directly wiyh each other?D) what is the highest address that can be given to PC-B that allows it to be on the same network as PC-A ?

Answers

Answer 1

Answer:

Explanation:

a) 192.168.1.16

b) 192.168.1.32

c) No

d) 192.168.1.30

Answer 2

Answer:

It’s somethint

Explanation:


Related Questions

Which of the following devices are used in networking?A. Routers.
B. Hubs.
C. TCP.
D. Switches.

Answers

Answer:

A, Routers

Explanation:

Routers are used

The devices used in networking are:

A. Routers

D. Switches

Thus, option (A) and (D) are correct.

A. Routers: Routers are network devices that facilitate the transfer of data packets between different networks. They determine the best path for data to reach its destination and enable communication between devices on separate networks.

B. Hubs: Hubs were commonly used in early networking but are now outdated. They are passive devices that broadcast data to all connected devices, leading to inefficient data transmission.

C. TCP: TCP (Transmission Control Protocol) is not a networking device but rather a communication protocol used in the transport layer of the TCP/IP protocol suite. It ensures reliable data delivery by establishing a connection between devices and managing data flow control.

D. Switches: Switches are network devices that connect multiple devices within a local area network (LAN). They forward data packets only to the intended recipient, allowing for efficient data transmission within the same network.

Thus, Routers and Switches are parts.

Thus, option (A) and (D) are correct.

Learn more about Networking here:

https://brainly.com/question/29350844

#SPJ6

Brian has a meeting to attend at 10:30 am. However, he got stuck in traffic. Everybody at his office was ready for the meeting and had to wait
for him to arrive. What should Brian do in this situation?
OA. He should start walking toward his workplace.
OB. He should wait for someone to call him and ask why he is late,
Ос.
He should inform his manager that he will be late.
OD. He should keep quiet about being late.

Answers

Answer:

C. infirm his manager that he will be late

Explanation:

thats the right thing to do in that situation so u don't leave them waiting

Can someone please help me? my audio visual teacher wants me to watch two movies. i've never seen them and i have no way to watch them. Has anybody seen them?

Answers

Answer:

You can try afdah or 123 movies, maybe try Netflix if you have it

Explanation:

The sites do have ads but that's where I usually watch my movies

You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next?
a) Check for data you have previously hidden.
b) Make the columns wider.
c) Check that the worksheet is not Read-Only.
d) Change the format to reduce the font size.

Answers

Answer:

a)

Explanation:

Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.

What is the value of j after this code is executed? int i = 6, int j=10; j+=i;

Answers

Answer:

16

Explanation:

+= is an assignment operator that adds a value to the existing value.

What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?A. Intelligence system.B. Artificial intelligence.C. Neural network.D. Genetic algorithm.

Answers

Answer: genetic algorithm


Explanation: A genetic algorithm is an intelligent system that mimics the evolutionary, survival-of-the fittest process to generate increasingly better solutions to a problem. Genetic algorithms are used to design aircraftparts such as fan blades etc.

Artificial intelligence system exploits the use of computers and technological devices to simulate the human mind's to solve potential problem concerns and make strategic decisions.

Artificial intelligence is essential due to the fact that it provides businesses with virtually unlimited insights into their operations and in some circumstances, Artificial intelligence can carry out tasks better than people, especially when it comes to recurring, technical-detailed activities like reviewing huge quantities of datasets to ensure essential fields are accurately filled in.

However,  Neural networks are based on Deep learning techniques, which are a subfield of machine learning. They're designed by the use of the concept of the human brain, and they work by simulating how real neurons communicate with one another.

In the disciplines of Artificial intelligence and machine learning, neural networks mimic the activity of the human brain, enabling computer programs to identify patterns, formulate strategies and tackle basic problems.

Finally, from the scope of Artificial intelligence, Genetic algorithm emulates the principle of Darwinian selection which chooses only the fittest for reproduction. By replicating the evolutionary path of survival-of-the-fittest to accomplish a stated goal, genetic algorithms could solve difficult issues with numerous variables and a huge number of alternative solutions.

Therefore, from the above explanations, we can conclude that an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem is known as a Genetic algorithm.

Learn more about artificial intelligence here:

https://brainly.com/question/23824028?referrer=searchResults

Which of the following statements are true regarding Steve Jobs and Steve Wozniak? Select 3 options

Answers

Answer:

Steve Job founded Apple and managed the company from its inception until his death.

Steve Wozniak worked for Hewlett Packard designing calculators before starting Apple.

Steve Jobs never learned to code and primarily focused on design.

Explanation:

Answer:

the person above me is correct

Explanation:

got it right on edge

If you view classified information through the internet on your work computer, either intentionally or inadvertently, what should you do first?

Answers

Answer:

disconnect your computer from the network

If you view classified information through the internet on your work computer, either intentionally or inadvertently, disconnect the computer from the network.

What is meant by computer networking?

Computer networking is the term for a network of connected computers that may communicate and share resources. These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols.

A group of computers sharing resources that are available on or offered by network nodes is known as a computer network. Over digital links, the computers communicate with one another using standard communication protocols.

Disconnect the PC from the network if you accidentally or purposely read classified information online while utilizing a business computer.

To learn more about computer networks refer to:

https://brainly.com/question/1167985

#SPJ2

Page No.:
NEW LINK
Date : / /
Write
any
three differences between Hard
Disk and floppy disk.​

Answers

Answer:

The difference is that a floppy relies on a floppy disk reader to spin its disk, where as a hard drive is a fully enclosed container that has it's reader enclosed as well. A floppy disk is a single plastic film disk, where as a hard disk can have multiple metal disks.

Explanation:

The variable, A, starts with the value, 1 The variable, B, starts with the value, 10 The variable, C, starts with the value, 100. The variable, X, starts with the value, 0 Store the value of C times 3 in X. Add the value of B times 6 to the value already in X Add the value of A times 5 to the value already in X. Display the value in X on the screen. Output #3 Pseudocode #3

Answers

Answer:

1. Start

2. A = 1

3. B = 10

4. C = 100

5. X = 0

6. X = C * 3

7. X = X + B * 6

8. X = X + A * 5

9. Print X

10. Stop

Explanation:

Required

Write the Pseudocode for the instruction

The pseudocode begins and ends with a start and stop statement

The next 4 lines initializes A, B, C and X

2. A = 1

3. B = 10

4. C = 100

5. X = 0

The next 3 lines calculates the new value of X base on the given instruction

6. X = C * 3

7. X = X + B * 6

8. X = X + A * 5

This line displays the value of X to the screen

9. Print X

Compare and Contrast the 1977 Freaky Friday and the 2003 Freaky Friday

Answers

Answer:

What do you mean by ?

Explanation:

I can't understand. Please tell clearly.

Which of these is the most likely result if the internet download speed in your home is 25 Mbps?
Your microphone won't record well.
O A game you previously downloaded will generate errors.
The printer may not function well.
Streaming movies may stop to buffer.

Answers

Answer:

Streaming movies may stop to buffer

Explanation:

microphones have a set record limit, and games downloaded wont generate errors unless something in the code is wrong, printers don't really need to connect to internet to work except for some, and streaming movies buffer because as you are watching them it downloads the next few minutes.

Which of the following conditions would most likely result in corrupted data? A. an open in a cable B. a VLAN mismatch C. a short in a cable D. none of above

Answers

Answer:

D. none of above

Explanation:

Option A is not appropriate because an open in a cable does not the data to be transferred at all. An open in the cable is when the intended connection is missing or there is a break in the wire which stops the current flow.

Option B is also incorrect because a VLAN mismatch is causes when two connected switch ports have different VLAN configurations and this does not let the data propagate successfully. So connectivity issues occur between the devices and data cannot be exchanged between them.

Option C is also incorrect because a short in a cable, like an open in a cable, does not let the data to be transferred. A short in a cable is when an unintended connection is there such as when two wires touch each other. So this leads to the current flow through the short.

The possible condition that can cause corrupted data are:

bad cables: using a wrong category of cables in order to interconnect devices for exchanging data.

exceeded cable distance limit: When the cable distances are exceeded this might result in signal loss.

faulty connectors: these are broken connectors which do not properly make a connection.

Which type of RAM is used exclusively in laptops?
a) SODIMM
b) DDR3
c) DDR
d) DDR4

Answers

Answer:

DDR3

Explanation:

someone can help plz " Provide definitions for the following terms: bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), Terabyte (TB)."

Answers

Answer:

Explanation:

Bit: A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.

Byte: A byte is a data measurement unit that contains eight bits, or a series of eight zeros and ones.

Kilobyte: A KB (kilobyte) is 1000 bytes.

Megatype: An MB (megabyte) is 1000 kilobytes.

Gigatype: A GB (gigabyte) is 1000 megabytes.

Terabyte: A TB (terabyte) is 1000 gigabytes.

hope this helped you!

Is Bob Lazar telling a lie/withholding information?

Answers

Answer:

I think he may be a nut, but I'm not sure, there's little evidence of what he says to be true.

DO ALL THE FACES YOU CAN DO ON YOUR COMPUTER! (Please tell me how to do them)

Answers

Answer. (: ): (; ); [: ]: [;  ];

Explanation:

Near the numbers and letters on your keyboard you should have ability to re-create the faces that you know or can find

Answer is B because portrait is define that they take only photographs of people and like to communicate with people they are well known or comfortable.

Answers

ty ive been looking for that answer

what pattern is a heart-shaped pattern that captures sound from a single direction, ?from the front?

Answers

Answer:

The pickup diagram for the Cardioid (heart-shaped) microphone pattern tells you is that the microphone is most sensitive to sound coming in from the front (where the blue arrow is), and will tend to “refuse” sound coming in from the other side (the red arrow points to that part).

Explanation:

When an online auction site increases its number of users, then the value of the site increases for everyone. This is an example of the _____.
gig economy
democratization of technology
network effect
Internet of Things

Answers

Answer:

Network Effect

Fill in the missing word in this program. class TooWide(Exception): pass answer = input('How wide is it? ') width = float(answer) try: if width > 30: raise TooWide else: print("Have a nice trip!") -------TooWide: print("Your luggage will not fit in the overhead bin.")

Answers

Answer:

Replace ______ with except

Explanation:

Your program is an illustration to try except in Python

When the Python interpreter sees a try statement, it expects a corresponding an except statement

So, the complete program is:

class TooWide(Exception): pass

answer = input('How wide is it? ')

width = float(answer)

try:

     if width > 30:

           raise TooWide

     else:

           print("Have a nice trip!")

except TooWide:

     print("Your luggage will not fit in the overhead bin.")

Answer:

except

Explanation:

took test

can java scanner not take in a negative input?

Answers

Answer:

It can take a negative input

Explanation:

When you declare a variable in Java and you get your input via Scanner library; the Scanner library will accept the input irrespective of whether it's negative or not.

Take for instance, the following segment

Scanner input = new Scanner(System.in);

int userinput = input.nextInt()

Irrespective of whether userinput is negative or positive, it'll accept it.

Which command is used to encrypt all passwords in a router configuration file?

Answers

Answer:

Service Password encryption

Explanation:

It is noted that the command used on routers, to get the data of all the passwords in a router configuration file encrypted is the service password encryption.

Service password encryption solely affects plain text passwords types that includes that of the line passwords or that of the enable password. The feature uses a simple substitution method to create a "secure" non-text password displayed in the configuration.

Which kind of testing runs the system in a simulated environment using simulated data?a) validation testing. b) verification testing. c) audit testing. d) matrix testing.

Answers

Answer: verification testing

Explanation:

Verification testing is the testing that runs the system in a simulated environment using simulated data. Verification testing involves different activities like design review, system requirements, business requirements, and code walkthrough which are used while a a product is being developed. It is done in order to ensure they the right product is being developed.

Which of the following is not a property of a constructor?A. The name of a constructor can be chosen by the programmerB. A constructor is called using the new operatorC. A constructor must have the same name as the classD. Constructors may be overloaded

Answers

Answer:

The answer is "Option A"

Explanation:

The constructor is a special member function whose task is to initialize an object from its class, and it doesn't return any value like int, float, double, etc. Its name and class name will always be the same, and when we create the class object so, the constructor is automatically called, and it may be overloaded, that's why we can say that except the "choice A", all were correct.

what is a good rule-of-thumb for using color background in a worksheet?

Answers

Answer: The answer is given below

Explanation:

A good rule-of-thumb for using color background in a worksheet are:

• Avoid using more than four colors as ideally 2-3 colors should be used.

• Opt for tones, shades, and tints rather than being tempted to use many colors.

• Colors that are controversial should be avoided.

• Color should be added when it's required to pass across a message.

• A base color should first be selected, then complementary colors should be added to it.

Describe a game that you have played (video game or other type of game) that had a good balance between being easy to learn the rules but hard to master overall. Identify specific parts of the gameplay and/or game mechanics that contributed to this balance.

Answers

Answer: Well my sister has a Super Mario Odyssey game for Nintend. The controls are easy to learn but the game is quite difficult. The goal is to find moons to catch up to Browser, who has stolen Mario’s friend, Peach. On the way you run into to challenges that are hard and easy. Overall the game is ballenced well. With amazing details and graphics.

Explanation:

You can access cloud files from any computer smart phone or tablet as long as it is connected to the Internet is it true or false

Answers

Answer:yes

Explanation:

because it is the internet

Write a program to print the sum of two given numbers.

Answers

Answer:

this program is for c++

Explanation:

#include<iostream>

main()

{

int num1,num2,added number;

cout<<"enter your first number";

cin>>num1;

cout<<"enter your second number":

cin>>num2:

num3=num1+num2;

cout<<"the added value of these two are",num3;

}

what device copies system files

Answers

Answer:

directs the entire computer system to carry out every activity, and regulates the

Explanation:

Other Questions
what is the main purpose for a plant to move water from the ground into the leaves Which best describes European attitudes about influencing American Indians? (A) forceful (B) hesitant (C) interested (D) relaxed The perimeter of a rectangle is P = 2w + 2L, where w is the width of the rectangle and L is the length of the rectangle. Rearrange this formula to find the width of the rectangle The list below shows the number of medals that one nation's team won at the Olympics. What is the ratio of gold medals to the total number of medals that the team won? Gold 34 Silver 30 Bronze 39 Please I need help with this question!! How did the Phenakistoscope advance the development of animation? 5. Why is it important that Toby stop Berlin's giggling? A manufacturer has a monthly fixed cost of $750 and a production cost of $15 for each item x that is produced. The product sells for $37 per item.Write the equation of the total cost function, C(x), in terms of x.Write the equation of the total revenue function, R(x), in terms of x.Write the equation of the profit function, P(x), in terms of x. Simplify P(x) completely. Look at the image of the solar system,According to Kepler, which planet travels the fastest?NeptuneOur Solar SystemO EarthSaturnO JupiterO MercuryNeptuneMarsUranusAsteroid Bilt.The SunMercuryEarthVenusJupiterMark this and returnSave and ExitNexSubmit What type of region would a corn field be A watch manufacturer claims that its watches gain or lose no more than 8 seconds in a year. How accurate are these watches, expressed as a percentage? Yo no __ feliz porque no aprob el examen de fsica. A(soy) B (estoy) find x (I really need help)7x-6=5x+18 Kalhat is a large city lying inside the gulf which is also called Kalhat. It is a fine city on the sea-coast 600 miles north-west of Dhofar. The people are Saracens who worship Mahomet. They are subject to Hormuz; and whenever the malik of Hormuz is at war with neighbors more powerful than himself, he comes to this city, because it is strongly built and situated, so that here he is afraid of no one. No corn is grown here, but it is imported by sea from other places. This city has a very good port, much frequented by merchant ships from India. "The Middle East," Marco Polo Reread the text carefully. According to Marco Polo, which labeled location is closest to the city of Dhofar? A B C D How do RNA's subcomponents affect its properties? (3 points) A. Adenine and cytosine bond with thymine and guanine, respectively, causing RNA to fold into functional units. B. Base pairing occurs within an RNA molecule to give RNA the three-dimensional shape needed for specific functions. C. Deoxyribose and phosphate interact to provide RNA with a backbone to which nucleotides become bound. D. The nitrogenous bases in RNA molecules undergo dehydration reactions to form large biological polymers. Saira is using the formula for the area of a circle to determine the value of LaTeX: \pi. She is using the expression LaTeX: Ar^{-2}\:A r 2where LaTeX: A\:=\:50.265\:A = 50.265and LaTeX: r\:=\:4\:r = 4. Use a calculator to evaluate Saira's expression to find her approximation for the value of LaTeX: \pi\:to the nearest thousandth. CPAs become involved in a variety of types of engagements. For each of the following statements, indicate whether it relates to an examination (E), review (R), or agreed-upon procedures (A) engagement. If the statement does not relate to examinations, reviews, or agreed-upon procedures, reply N. Statement Type of Engagement a. When financial statements are involved, this is referred to as an audit. b. The term "We are not aware of any material modifications that should be made" is often included in the report. c. The report issued provides a summary of procedures followed and findings. d. The report issued provides "reasonable assurance." e. The procedures involved are generally limited to inquiry and analytical procedures. f. The report issued provides "absolute assurance." g. The report issued provides "limited assurance." h. The procedures followed are agreed upon with the specified user or users. i. This type of engagement provides more assurance than a review. j. The CPA need not be independent to perform this service. A car goes from 30 m/s to 20 m/s in 2 seconds. What is the acceleration of the car in m/s2? what is the height of a trapezoid with one base equal to 20m, the other base equal to 7m, and an area of 135m^2 Question 7 (1 point)When the Thought Police secretly arrest and execute someone, most people would say that person has beenAnnihilatedVaporizedCleansed Deleted