Answer:
Explanation:
An IP address is a 32-bit number. It uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.
IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.
For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32-bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.
These 8-bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation.
For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks don't know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.
For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example 192.168.123.132 and divide it into these two parts, you get 192.168.123. Network .132 Host or 192.168.123.0 - network address. 0.0.0.132 - host address.
The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.
In TCP/IP, the parts of the IP address that are used as the network and host addresses aren't fixed. Unless you have more information, the network and host addresses above can't be determined. This information is supplied in another 32-bit number called a subnet mask. The subnet mask is 255.255.255.0 in this example. It isn't obvious what this number means unless you know 255 in binary notation equals 11111111. So, the subnet mask is 11111111.11111111.11111111.00000000.
Lining up the IP address and the subnet mask together, the network, and host portions of the address can be separated:
11000000.10101000.01111011.10000100 - IP address (192.168.123.132)
11111111.11111111.11111111.00000000 - Subnet mask (255.255.255.0)
The first 24 bits (the number of ones in the subnet mask) are identified as the network address. The last 8 bits (the number of remaining zeros in the subnet mask) are identified as the host address. It gives you the following addresses:
11000000.10101000.01111011.00000000 - Network address (192.168.123.0)
00000000.00000000.00000000.10000100 - Host address (000.000.000.132)
So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and process it.
Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other common subnet masks are:
Decimal Binary 255.255.255.192 1111111.11111111.1111111.11000000 255.255.255.224 1111111.11111111.1111111.11100000
Internet RFC 1878 (available from InterNIC-Public Information Regarding Internet Domain Name Registration Services) describes the valid subnets and subnet masks that can be used on TCP/IP networks.
Hope this helps!
3. Elaborate why and how you use “Output” command in Python Programming Language, write the syntax of output command?
Answer:
Explanation:
you use print() to output something
so it would be like this:
print("What is up, gamer?")
so the syntax is print() with whatever is in the parentheses being what you want to output
Sebutkan contoh komputer analog, komputer digital, dan komputer hybrid
Answer: the examples of analog computer is voltmeter
Example of digital computer is tablet,mobile etc
Example of hybrid computer is digital meters used nowadays in cars etc
What are 3 things message timing must include
Answer:
1)Message Timing. Another factor that affects how well a message is received and understood is timing. ...
2)Access Method. Access method determines when someone is able to send a message. ...
3)Flow Control. Timing also affects how much information can be sent and the speed that it can be delivered.
True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.
The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.
There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.
It uses the client–server model architecture via different control and data connections between the client and the server.
Learn more from
https://brainly.com/question/20602197
1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols
Answer:
e
Explanation:
e
Leon wants an output from his tablet. What should he look at? A. the memory chip B. the processor C. the screen D. the power button
Answer:
he should look at the screen
Answer:
C. The screen
Explanation:
got it on edge
Write a function predict_wait that takes a duration and returns the predicted wait time using the appropriate regression line, depending on whether the duration is below 3 or greater than (or equal to) 3.
The appropriate function which could be used to model the scenario can be written thus ; The program is written in python 3 ;
y = 3x + 3.5
#since no data is given ; using an hypothetical regression equation expressed in slope - intercept format ; where, x = duration and y = Predicted wait time.
def predict_wait(x) :
#initialize a function named predict_wait and takes in a certain duration value, x
y = 3*x + 3.5
#input the x - value into the regression equation to calculate y
return y
#return y
Learn more : https://brainly.com/question/25556810
explain how you activate window explore
Answer:
Win+R -> Type "explorer.exe" -> Press enter
What is the grooming process as it relates to online predators
the process by which online predators lure in minors to get close enough to hurt them.
what is the different sheets in excel
Answer:
By clicking the sheet tabs at the bottom of the Excel window, you can quickly select one or more sheets. To enter or edit data on several worksheets at the same time, you can group worksheets by selecting multiple sheets. You can also format or print a selection of sheets at the same time.
Explanation:
hope this helps
Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g
The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.
We can arrive at this answer because:
Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.
More information:
https://brainly.com/question/7227504
what is the difference between software hardware ???
Answer:
Some differences are written below:
Explanation:
Hardware refers to the physical components of the computer. You can see and touch it (keyboard, screen, mouse, monitor..etc..)
Computer Software is a programming code executed on a computer processor.We can see and also use the software but can’t touch them. (Ms Word, Excel, Power Point, Photoshop..etc..)
Hardware can't perform tasks without software. And Software can't be executed without software.
Hardware has four main categories: input device, output devices, storage, and internal components.
Software is divided into System software, Programming software and Application software.
Hardware is not affected by computer viruses. Software is affected by computer viruses.
ARAT ML MGA LODS
ID:426667817
Today we see the advantages as well as disadvantages of a wired network. In comparison what technology would you recommend Wired Ethernet or a Wireless network technology for home and what would you recommend for business? Explain your answer
Answer:
wired network
Explanation:
Wired networks are generally much faster than wireless networks. ... This is mainly because a separate cable is used to connect each device to the network with each cable transmitting data at the same speed. A wired network is also faster since it never is weighed down by unexpected or unnecessary traffic.
hope that helps your welcome
1. Where did the Industrial Revolution start and why did it begin there?
Answer:
The first Industrial Revolution began in Great Britain in the mid-to-late 1700s, when innovation led to goods being produced in large quantities due to machine manufacturing.
This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain's economic development from 1760 to 1840.
Answer:
This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain’s economic development from 1760 to 1840
Historians have identified several reasons for why the Industrial Revolution began first in Britain, including: the effects of the Agricultural Revolution, large supplies of coal, geography of the country, a positive political climate, and a vast colonial empire.
Explanation:
We can find out how robots work by looking in detail at the smaller parts. What do we call this?
Answer: This can be called the engineering.
Explanation:
Because the small parts is the bearings inside the robot
In a _____, there is no skipping or repeating instructions. A. iteration B. sequence C. selection D. conditional
Answer:
B: Sequence.
Explanation:
The ______ Works on a single variable or constant. *
Answer:
man
Explanation:
Develop an algorithm and draw a flowchart to determine and input number is palindrome or not.
What's computer hardware
Name a type of malware designed to provide unauthorized, remote access to a user's computer
Answer:
spyware
Explanation:
your welcome;)
Answer:
trojan horse
Explanation:
or just trojan
WORTH 75 POINTS!!
Which best describes the video encoding process?
converting analog video into digital video
filming a video at 30 frames per second
saving a digital video in a specific file format
watching a video while the file downloads
Answer:
To watch a digital video, you must use the codec that was used to encode the video file. Most videos are compressed.
Answer:
Why is compression important for video streaming?
to increase the number of frames per second so that motion appears smooth
to watch video without waiting for it to download(this one)
to improve image quality
to increase file size
Explanation:
Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly. Each subset is assigned a cost of maintenance, which is directly proportional to the highest danger level of the road present in that subset. The engineer wants to select the smallest subset that keeps the towns connected directly or indirectly and that also has the lowest cost of maintenance. Develop an algorithm to find such a subset. Justify the correctness of your algorithm and derive its runtime.
Answer:
Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly.
You modified the GreenvilleRevenue program to include a number of methods. Now modify every data entry statement to use a TryParse() method to ensure that each piece of data is the correct type. Any invalid user entries should generate an appropriate message, and the user should be required to reenter the data.
using System;
using static System.Console;
class GreenvilleRevenue
{
static void Main(string[] args)
{
const int fee = 25;
int lastYearsContestants;
int thisYearsContestants;
const int LOW = 0;
const int HIGH = 30;
int other = 0;
int dancer = 0;
int musician = 0;
int singer = 0;
WriteLine("**********************************");
WriteLine("* The stars shine in Greenville. *");
WriteLine("**********************************");
WriteLine("");
lastYearsContestants = getContestantsNum(message, LOW, HIGH);
string[] contestant = new string[thisYearsContestants];
string[] talent = new string[thisYearsContestants];
getContestantsInfo(contestant, talent);
for (int x = 0; x < talent.Length; ++x)
{
if (talent[x] == "O")
{
++other;
}
else if (talent[x] == "S")
{
++singer;
}
else if (talent[x] == "D")
{
++dancer;
}
else if (talent[x] == "M")
{
++musician;
}
}
Clear();
WriteLine("Currently signed up, there are..");
WriteLine("{0} dancers", dancer);
WriteLine("{0} singers", singer);
WriteLine("{0} musicians", musician);
WriteLine("{0} everything else!", other);
contestantByTalent(contestant, talent);
Clear();
contestantInfo(thisYearsContestants, lastYearsContestants, fee);
}
static int getContestantsNum(string message, int LOW, int HIGH)
{
WriteLine("Please enter the number of contestants for last year.>>");
string input = ReadLine();
int contestantsNum = Convert.ToInt32(input);
while (contestantsNum < LOW || contestantsNum > HIGH)
{
WriteLine("Valid numbers are 0 through 30, Please try again.>>");
contestantsNum = Convert.ToInt32(ReadLine());
}
return contestantsNum;
WriteLine("Please enter the number of contestants for this year.>>");
string input = ReadLine();
int contestantsNum = Convert.ToInt32(input);
while (contestantsNum < LOW || contestantsNum > HIGH)
{
WriteLine("Valid numbers are 0 through 30, Please try again.>>");
contestantsNum = Convert.ToInt32(ReadLine());
}
return contestantsNum;
}
static string getTalent(int contestantsNum)
{
bool correct = false;
string talentType = "";
while (!correct)
{
WriteLine("What is contestant " + contestantsNum + "'s skill? Please enter 'S' for Singer, 'D' for Dancer, 'M' for " +
"Musician, 'O' for Other.>>");
talentType = ReadLine().ToUpper();
if (talentType == "S" || talentType == "D" || talentType == "M" || talentType == "O")
{
correct = true;
}
else
{
WriteLine("Please enter a valid response.>>");
}
}
return talentType;
}
static void contestantByTalent(string[] contestant, string[] talent)
{
WriteLine ("To see a list of all contestants with a specific talent, Please enter a talent code.talent codes are(S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
string entry = ReadLine().ToUpper();
while (entry != "E")
{
if (entry != "S" && entry != "D" && entry != "M" && entry != "O")
{
WriteLine("That wasn't a valid talent code. Valid talent codes are (S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
entry = ReadLine().ToUpper();
if (entry == "E")
break;
}
for (int x = 0; x < talent.Length; ++x)
{
if (entry == talent[x])
WriteLine("Contestant " + contestant[x] + " talent " + talent[x]);
}
WriteLine("To see a list of all contestants with a specific talent, Please enter a talent code. talent codes are (S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
entry = ReadLine().ToUpper();
}
}
static void getContestantsInfo(string[] contestant, string[] talent)
{
for (int x = 0; x < contestant.Length; ++x)
{
WriteLine("What is the name for Contestant " + (x + 1) + "?");
contestant[x] = ReadLine();
talent[x] = getTalent(x + 1);
}
}
static void contestantInfo (int thisYearsContestants, int lastYearsContestants, int fee)
{
if (thisYearsContestants > lastYearsContestants * 2)
{
WriteLine("The competition is more than twice as big this year!");
WriteLine("The expected revenue for this year's competition is {0:C}", (thisYearsContestants * fee));
}
else
if (thisYearsContestants > lastYearsContestants && thisYearsContestants <= (lastYearsContestants * 2))
{
WriteLine("The competition is bigger than ever!");
WriteLine("The expected revenue for this year's competition is {0:C}", (thisYearsContestants * fee));
}
else
if (thisYearsContestants < lastYearsContestants)
{
WriteLine("A tighter race this year! Come out and cast your vote!");
WriteLine("The expected revenue for this year's competition is {0:C}.", (thisYearsContestants * fee));
}
}
}
You are a knowledge engineer and have been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications. What are some sample questions you would ask the loan manager at a bank?
As a knowledge engineer, it should be noted that some of the questions that should be asked include:
What do you expect in the loan application process?How is the loan going to be processed?What do you expect from the applicant to fund the loan?A knowledge engineer simply means an engineer that's engaged in the science of building advanced logic into the computer systems.
Since the knowledge engineer has been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications, he should asks questions that will be vital for the loan process.
Learn more about engineers on:
https://brainly.com/question/4231170
what don't you like about creating a new document using Microsoft office button
What are two drawbacks of using netbook ?
Answer: They are becoming obsolete and they are usually low-performance. Also a 32-bit system.
Would appreciate brainly <3
Answer:
Laptop computers are difficult to repair, upgrade or modify due to their closed and integrated design. While storage drives and RAM are usually accessible because these are the things you will most likely upgrade, it is often difficult to modify or replace your CPU, graphics chip or motherboard. These jobs will usually require professional equipment and tools–or a hired professional technician. Additionally, while in a desktop computer the possible configurations are almost unlimited, laptop configurations are limited to those provided by laptop manufacturers. Some software may also be incompatible with laptop hardware, and installations of different operating systems than those bundled with the laptop may result in hardware failures.
The system tray contains _____.
A. the battery life
B. the computer's hard drive
C. the operating system
D. Quick Launch
The notification area (also called the "system tray") is located in the Windows Taskbar, usually at the bottom right corner. It contains miniature icons for easy access to system functions such as antivirus settings, printer, modem, sound volume, battery status, and more.
Answer:
A BATTERY LIFEExplanation: The person said it and it was right I believed them, and they made me get a 100% thank you sir/madam and as you can see, I have proof so your welcome and thank you.I Wouldn't just say the letter like A or C because everyone's quiz is different, and it changes but either way whatever your welcome and again thank you.Write a python function to compute a certain number to a given power. The program should continue asking the user for number and power and display the result until the user enters 0 as the number. Note: don't use the power function of Python. Compute the power using a for or a while loop.
while True:
number = int(input("input the number: "))
exponent = int(input("input the exponent : "))
if number == 0:
break
else:
result = 1
while exponent != 0:
result *= number
exponent-=1
print("Answer = " + str(result))
we are asked not to use the power function of python. The question wants us to use a for or a while loop to compute the power.
The while loop makes sure the user is always asked to input the number and an exponent.
If the users number equals 0, the while loop will break.
Else the code will find the power of the number.
Finally, we print the answer if the user number is not zero
The bolded part of the code are python keywords.
read more: https://brainly.com/question/12992668?referrer=searchResults
computer Graphics:
B. Arbitrary reference point:
1) Apply a rotation by 60° on the Pivot Point (-10, 10) and display it.
2) Apply a rotation by 270° on the Pivot Point (10, 0) and then translate it by tx
= -20 and ty = 5. Display the final result.