Answer:
Explanation:
An IP address is a 32-bit number. It uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.
IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.
For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32-bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.
These 8-bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation.
For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks don't know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.
For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example 192.168.123.132 and divide it into these two parts, you get 192.168.123. Network .132 Host or 192.168.123.0 - network address. 0.0.0.132 - host address.
The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.
In TCP/IP, the parts of the IP address that are used as the network and host addresses aren't fixed. Unless you have more information, the network and host addresses above can't be determined. This information is supplied in another 32-bit number called a subnet mask. The subnet mask is 255.255.255.0 in this example. It isn't obvious what this number means unless you know 255 in binary notation equals 11111111. So, the subnet mask is 11111111.11111111.11111111.00000000.
Lining up the IP address and the subnet mask together, the network, and host portions of the address can be separated:
11000000.10101000.01111011.10000100 - IP address (192.168.123.132)
11111111.11111111.11111111.00000000 - Subnet mask (255.255.255.0)
The first 24 bits (the number of ones in the subnet mask) are identified as the network address. The last 8 bits (the number of remaining zeros in the subnet mask) are identified as the host address. It gives you the following addresses:
11000000.10101000.01111011.00000000 - Network address (192.168.123.0)
00000000.00000000.00000000.10000100 - Host address (000.000.000.132)
So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and process it.
Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other common subnet masks are:
Decimal Binary 255.255.255.192 1111111.11111111.1111111.11000000 255.255.255.224 1111111.11111111.1111111.11100000
Internet RFC 1878 (available from InterNIC-Public Information Regarding Internet Domain Name Registration Services) describes the valid subnets and subnet masks that can be used on TCP/IP networks.
Hope this helps!
Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g
The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.
We can arrive at this answer because:
Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.
More information:
https://brainly.com/question/7227504
Partially-filled Arrays
Write the function rindby() which stands for remove mark>if not divisiby by. The function removes all elements from the array that are not evenly divisible by the argument n. You can find out if a number is evenly divisible by n using the remainder operator: % (there will be nothing left over).
The function returns the number of items removed or -1 if the array was originally empty.
The function takes 3 arguments:
the array of int that may be modified.
the size of the array (use size_t as the type)
the int n used to check for divisibility
Here are two short examples:
int a[] = {2, 3, 4, 5, 6};
size_t size = 5;
int removed = rindby(a, size, 2);
// removed->2, a = [2, 4, 6], size = 3
size = 0;
removed = rindby(a, size, 3);
// removed-> -1, no change otherwise
In the first case, the numbers 3 and 5 are removed because they are not divisible by 2. Only the numbers that are divisible by 2 are left in the array.
In the second, size has been set to , so the input array is empty and the function returns - 1.
Exam C++ Quick Reference
p1.cpp
1 #include // size_t for sizes and indexes
2 using namespace std;
3
4 ////////////////WRITE YOUR FUNCTION BELOW THIS LINE ///////////////
5 int rindby(int all, size_t& size, int number)
6 {
7 int result;
8 // Add your code here
9 return result;
10 }
11
Answer:
um
Explanation:
Tamanika got a raise in her hourly pay, from $15.90 to $17.65. Find the percent increase
50 free po.intssssssss!
Answer:ty
Explanation:
LIst types of computer process ?
Answer:
Transaction Processing.
Distributed Processing.
Real-time Processing.
Batch Processing.
Multiprocessing.
1. Which of the following options can you use to format the contents of a cell?
Select all that apply.
a. Font Size
b. Sort
C. Italic
d. Underline
Answer:
a
Explanation:
The correct options are A, C, and D. Front Size, Italic, and Underline are the options can you use to format the contents of a cell.
You can also use the keyboard shortcuts Ctrl+B, Ctrl+I, and Ctrl+U to bold, italicize and underline a selection of text.
What is the use of format cells?You can only alter how cell data appears in the spreadsheet by using cell formats. It's critical to remember that the data's value is unaffected; only how the data is presented has changed. The formatting options include options for fractions, dates, timings, scientific alternatives, and more.
Regular, Bold, Italic and Bold Italic are the four different sorts of font styles. Selected cells or ranges in a worksheet can have their font style changed. Changing the typeface involves the following steps: Pick the cell or cells that need to be changed. The text you want to format should be selected. Go to the Home tab and select Bold, Italic, or Underline. Ctrl + B will bold text. Ctrl + I will italicize text.
Thus, the correct options are A, C, and D.
Learn more about Format cell here:
https://brainly.com/question/24139670
#SPJ2
stages of IT revolution
Answer:
Technological revolutions are dissected into three stages:
The introduction stageThe permeation stageThe power stage
discuss with illustrations how to implement a simple home network
Answer:
How to Set Up a Home Network- Beginners Guide
Today almost every home and small office has a local network, and an Internet connection.
The home network or small area network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.
In this tutorial you will learn how you to build and setup a home or small area network and connect it to the Internet.
Explanation:
Choosing a Wired or Wireless Network
Do You Build a wired or Wireless Network? which is best?
Early (pre 2008) home networks were predominately wired networks.
Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages
Fast typically 100 Mbps to 10 Gbps
Secure and reliable.
Wired Network Dis-Advantages
Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.
Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.
Not so easy for visitors and mobile devices (laptops) to connect to.
Main Uses
It Is best used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).
What is the best data type for nationality field
Answer:
ISO Alpha-2 (two-letter country code) ISO Alpha-3 (three-letter country code) ISO Numeric (three-digit country code)
Why do some computer systems not allow users to activate macros?
O Amacro can be used by only one person.
0 You must close all other programs to run a macro.
O The Word software does not work well with macros.
O Macros can carry viruses that can harm a computer.
The _______ is responsible for fetching program instructions, decoding each one, and performing the indicated sequence of operations.
Answer: C P U Terms in this set (124) What is the CPU responsible for? Fetching program instructions, decoding each instruction that is fetched, and performing the indicated sequence of operations on the correct data.
Explanation:
The Central Processing Unit is responsible for fetching program instructions, decoding each one, and performing the indicated sequence of operations.
What is CPU?A central processing unit, often known as a central processor, main processor, or simply processor, is the electrical circuitry that processes computer program instructions. The CPU executes fundamental arithmetic, logic, controlling, and input/output operations as provided by the program's instructions.
The CPU is in charge of all data processing. It keeps data, interim outcomes, and instructions saved (program). It controls how all computer components work.
Therefore, it can be concluded that The CPU is in charge of acquiring program instructions, decoding each one, and performing the prescribed series of actions on the proper data.
Learn more about CPU here:
https://brainly.com/question/21477287
#SPJ5
In a _____, there is no skipping or repeating instructions. A. iteration B. sequence C. selection D. conditional
Answer:
B: Sequence.
Explanation:
Which statement best explains how the main idea relates to taking notes?
The main idea is always included in effective notes.
The main idea is always easy to identify.
The main idea is rarely used as a title for notes.
The main idea is rarely identified by listening or reading
Answer:
The main idea is always included in effective notes.
Answer:
a
Explanation:
I did the quiz
how can computers be a threat to public safety??
help asap marking brainiest
Create a program that uses an array of Shape references to objects of each concrete class in the hierarchy (see program-2). The program should print a text description of the object to which each array element refers. Also, in the loop that processes all the shapes in the array, determine the size of each shape If it‟s a TwoDimensionalShape, display its area. If it‟s a ThreeDimensionalShape, display its area and volum
The program uses an array for shape reference to objects of each concrete class given. The program is in text description in java language.
What is a program array?Array programming in computer science refers to methods that allow operations to be applied to a whole set of values at once. This kind of solution is frequently used in scientific and engineering settings.
Shape.java
public abstract class Shape { private int sides;
public Shape() {
this.sides=0;
}
public Shape(int sides) { super(); this.sides = sides;
}
public int getSides() { return sides;
}
public void setSides (int sides) { this.sides = sides;
}
public abstract double calcArea();
Override
public String toString() {
return "This Shape has [sides=" + sides + "]";
Therefore, the program array is given above.
To learn more about program array, refer to the link:
https://brainly.com/question/13104121
#SPJ2
Question # 1 Multiple Select Which features are important when you plan a program? Select 4 options. Knowing what information is needed to find the result. Knowing what information is needed to find the result. Knowing what the user needs the program to accomplish. Knowing what the user needs the program to accomplish. Knowing how many lines of code you are allowed to use. Knowing how many lines of code you are allowed to use. Knowing what you want the program to do. Knowing what you want the program to do. Knowing how to find the result needed. Knowing how to find the result needed.
Answer:
c
Explanation:
Answer:
Knowing what the user needs the program to accomplish.Knowing how to find the result needed.Knowing what information is needed to find the result.Knowing what you want the program to doExplanation:
:D
F= A· (B+C). draw the symbol for the logic gate
Answer:
You need an AND gate and an OR gate.
Explanation:
see picture below
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?
It should be noted that the intention for the creation of the internet was simply for resources sharing.
The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.
It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.
Learn more about the internet on:
https://brainly.com/question/2780939
Which device can perform both input and output functions?
Answer:
For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output devices. Devices for communication between computers, such as modems and network cards, typically perform both input and output operations.
Answer:
Modems and network cards, typically perform both input and output operations
WORTH 75 POINTS!!
Which best describes the video encoding process?
converting analog video into digital video
filming a video at 30 frames per second
saving a digital video in a specific file format
watching a video while the file downloads
Answer:
To watch a digital video, you must use the codec that was used to encode the video file. Most videos are compressed.
Answer:
Why is compression important for video streaming?
to increase the number of frames per second so that motion appears smooth
to watch video without waiting for it to download(this one)
to improve image quality
to increase file size
Explanation:
The ______ Works on a single variable or constant. *
Answer:
man
Explanation:
True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
Answer:
The answer is False.
Which two are computing devices? (Choose two)
A. Unix
B. Laptop
C. Server
D. Mac OS
Answer:
ANS is no.B and no. C
hope it helps
You modified the GreenvilleRevenue program to include a number of methods. Now modify every data entry statement to use a TryParse() method to ensure that each piece of data is the correct type. Any invalid user entries should generate an appropriate message, and the user should be required to reenter the data.
using System;
using static System.Console;
class GreenvilleRevenue
{
static void Main(string[] args)
{
const int fee = 25;
int lastYearsContestants;
int thisYearsContestants;
const int LOW = 0;
const int HIGH = 30;
int other = 0;
int dancer = 0;
int musician = 0;
int singer = 0;
WriteLine("**********************************");
WriteLine("* The stars shine in Greenville. *");
WriteLine("**********************************");
WriteLine("");
lastYearsContestants = getContestantsNum(message, LOW, HIGH);
string[] contestant = new string[thisYearsContestants];
string[] talent = new string[thisYearsContestants];
getContestantsInfo(contestant, talent);
for (int x = 0; x < talent.Length; ++x)
{
if (talent[x] == "O")
{
++other;
}
else if (talent[x] == "S")
{
++singer;
}
else if (talent[x] == "D")
{
++dancer;
}
else if (talent[x] == "M")
{
++musician;
}
}
Clear();
WriteLine("Currently signed up, there are..");
WriteLine("{0} dancers", dancer);
WriteLine("{0} singers", singer);
WriteLine("{0} musicians", musician);
WriteLine("{0} everything else!", other);
contestantByTalent(contestant, talent);
Clear();
contestantInfo(thisYearsContestants, lastYearsContestants, fee);
}
static int getContestantsNum(string message, int LOW, int HIGH)
{
WriteLine("Please enter the number of contestants for last year.>>");
string input = ReadLine();
int contestantsNum = Convert.ToInt32(input);
while (contestantsNum < LOW || contestantsNum > HIGH)
{
WriteLine("Valid numbers are 0 through 30, Please try again.>>");
contestantsNum = Convert.ToInt32(ReadLine());
}
return contestantsNum;
WriteLine("Please enter the number of contestants for this year.>>");
string input = ReadLine();
int contestantsNum = Convert.ToInt32(input);
while (contestantsNum < LOW || contestantsNum > HIGH)
{
WriteLine("Valid numbers are 0 through 30, Please try again.>>");
contestantsNum = Convert.ToInt32(ReadLine());
}
return contestantsNum;
}
static string getTalent(int contestantsNum)
{
bool correct = false;
string talentType = "";
while (!correct)
{
WriteLine("What is contestant " + contestantsNum + "'s skill? Please enter 'S' for Singer, 'D' for Dancer, 'M' for " +
"Musician, 'O' for Other.>>");
talentType = ReadLine().ToUpper();
if (talentType == "S" || talentType == "D" || talentType == "M" || talentType == "O")
{
correct = true;
}
else
{
WriteLine("Please enter a valid response.>>");
}
}
return talentType;
}
static void contestantByTalent(string[] contestant, string[] talent)
{
WriteLine ("To see a list of all contestants with a specific talent, Please enter a talent code.talent codes are(S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
string entry = ReadLine().ToUpper();
while (entry != "E")
{
if (entry != "S" && entry != "D" && entry != "M" && entry != "O")
{
WriteLine("That wasn't a valid talent code. Valid talent codes are (S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
entry = ReadLine().ToUpper();
if (entry == "E")
break;
}
for (int x = 0; x < talent.Length; ++x)
{
if (entry == talent[x])
WriteLine("Contestant " + contestant[x] + " talent " + talent[x]);
}
WriteLine("To see a list of all contestants with a specific talent, Please enter a talent code. talent codes are (S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
entry = ReadLine().ToUpper();
}
}
static void getContestantsInfo(string[] contestant, string[] talent)
{
for (int x = 0; x < contestant.Length; ++x)
{
WriteLine("What is the name for Contestant " + (x + 1) + "?");
contestant[x] = ReadLine();
talent[x] = getTalent(x + 1);
}
}
static void contestantInfo (int thisYearsContestants, int lastYearsContestants, int fee)
{
if (thisYearsContestants > lastYearsContestants * 2)
{
WriteLine("The competition is more than twice as big this year!");
WriteLine("The expected revenue for this year's competition is {0:C}", (thisYearsContestants * fee));
}
else
if (thisYearsContestants > lastYearsContestants && thisYearsContestants <= (lastYearsContestants * 2))
{
WriteLine("The competition is bigger than ever!");
WriteLine("The expected revenue for this year's competition is {0:C}", (thisYearsContestants * fee));
}
else
if (thisYearsContestants < lastYearsContestants)
{
WriteLine("A tighter race this year! Come out and cast your vote!");
WriteLine("The expected revenue for this year's competition is {0:C}.", (thisYearsContestants * fee));
}
}
}
Find the error and rewrite the code with the error fixed.
// INSTANCE VARIABLE
public class Main {
public static void main(String[] args) {
Product prod1 = new Product();
prod1.Barcode = 123456;
Product prod2 = new Product();
prod2.Barcode = 987654;
System.out.println(prod1.Barcode);
System.out.println(prod2.Barcode);
}
}
public class Product {
public int Barcode;
}
Answer:
Explanation:
1st mistake: Barcode is written with upeer case, that's not the convention for variables in java, only classes.
2nd: Barcode is public, it is convention to always leave variables private then create getters and setters in case you need to change the value but never acess the variable outside the class it belongs. Also the class should at least have a default constructor in case you are going to instantiate an object outside it.
so the product class should be:
--------------------------------------------------------------------
public class Product {
private int barcode;
public Product() {
// default constructor
}
public int getBarcode() {
return barcode;
}
public void setBarcode(int barcode) {
this.barcode = barcode;
}
}
-------------------------------------------------------------------------
3rd: in the main class now you can instantiate the 2 objects but you are gonna set the variable and get the value through the method, like this:
public class Main {
public static void main(String[] args) {
Product prod1 = new Product();
prod1.setBarcode(123456);
Product prod2 = new Product();
prod2.setBarcode(987654);
System.out.println(prod1.getBarcode());
System.out.println(prod2.getBarcode());
}
}
-----------------------------------------------------------------------------------
Assuming the 2 classes (main and product) are in the same package. But in case they are in different packages, just make sure to import the Product class into the Main class so that you can instantiante an object (new Product()) of it.
Kiểm tra cặp số hứa hôn
Đầu vào : số nguyên n,m
Đầu ra : in ra n,m là cặp số hứa hôn và in ra không là số hứa hôn nếu ngược lại
Answer:
Sorry im not Vietnam so please explain it in English or ask someone who can speak Vietnam to help you
Write SQL queries to answer the following questions: (15 points) a. Which students have an ID number that is less than 50000
Answer:
SELECT * FROM STUDENTS WHERE ID < 50000
Explanation:
If we assume the table is called STUDENTS, then we want to select everything (represented by *), where (like an if statement) the ID (assuming the name of the column) is less than 50000.
Should people who are able to break a hashing algorithm be allowed to post their findings on the Internet?
Answer:
Cyber security is a very important aspect of digital world. Without cyber security our sensitive data is at risk. Its very important that companies keep our system safe by spotting any security vunerabilities. SO ACORDING TO ME I DO NOT THINK THEY SHOULD BE ABLE TO POST THEIR FINDINGS ON THE INTERNET As it may contain viruses
Write a program, using case statements, that mimics a calculator. The program should take as input two integers and the operation to be performed. It should then output the numbers, the operator, and the result. For division, of the denominator is zero, output an appropriate message.
Answer:#include<iostream>
using namespace std;
int main() {
int var1, var2;
char operation;
cout << "Enter the first number : ";
cin >> var1;
cout << endl;
cout <<"Enter the operation to be perfomed : ";
cin >> operation;
cout << endl;
cout << "Enter the second nuber : ";
cin >> var2;
cout << endl;
bool right_input = false;
if (operation == '+') {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 + var2);
right_input = true;
}
if (operation == '-') {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 - var2);
right_input = true;
}
if (operation == '*') {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 * var2);
right_input = true;
}
if (operation == '/' && var2 != 0) {
cout << var1 << " " << operation << " " << var2 << " = " << (var1 - var2);
right_input = true;
}
if (operation == '/' && var2 == 0) {
cout << "Error. Division by zero.";
right_input = true;
}
if (!right_input) {
cout << var1 << " " << operation << " " << var2 << " = " << "Error;";
cout << "Invalid Operation!";
}
cout << endl;
system("pause");
return 0;
}
Explanation:
Discuss some of the reasons you feel that people have for either liking or disliking Excel