Answer:
C. 220.100.100.45 to 220.100.100.46
Explanation:
The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.
The useable host IP addresses are gotten from the formula '[tex]2^{n}[/tex]-2', with n=2 bits.
useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.
While the 12th subnet is 12 x 2^2 = 44.
This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.
Best of Luck
for your work and
d
Best wishes for you
.
oh, why thank you same to you
Describe two circumstances where access services might get implemented by organizations please.
Answer:
Answered below
Explanation:
Remote access enables access to an organisations network from remote places. Certain conditions require such access. An organisation might require their workforce to work from home especially in this coronavirus health pandemic situation. Therefore remote access is necessary.
Also attending to customers needs, virtual meetings and connections to workers and clients all over the world, can only be made possible by the implementation of secured remote access, by the organisation.
Olivia wants to send a report to her boss concerning an upcoming project. Which communication format should she use to send a formal message to her boss? A. email B. chat C. forum D. blog
Answer:
A. Email. It is formal
Explanation:
Answer:
Explanation:
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.
Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.
It gives an illustration of the relationship of the National preparedness mission elements of risk.
Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.
However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.
Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.
When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.
THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.
"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.
Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color vision for identifying differences in colored wires critical thinking and reasoning skills for analyzing information stress management for handling urgent tasks mechanical knowledge and ability to drive and operate machinery working well with customers and being friendly
Answer:
a, c, d
Explanation:
Answer:
it is just A
Explanation:
on edge. unit test review
Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To do this,she right clicks on the add-in file and selects an option from the menu. What could the option be?
A) Copy
B) Delete
C) Rename
D) Properties
Answer:
The correct answer is:
Properties (D)
Explanation:
First of all, option D (Properties) is the option that makes the most sense in this scenario, because the other options: Copy, Delete, and Rename are unrelated commands to what is to be achieved.
Secondly and more practically, an add-in file may not load in excel, and most of the time it is blocked by default and has to be unblocked. The following steps are used:
1. close Excel if it is open
2. open the folder where the add-in file is located, right-click on the add-in file, and select "properties"
3. a display tray will appear, having the attributes: Read-only, Hidden, Advanced, and unblock. Click the checkbox against "unblock" and make sure it is checked.
4. click Apply and Click Ok
Voila, your add-in file is unblocked.
N:B The Images are for steps 2 and 3
The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting.
Answer:
The correct approach is "Presence awareness".
Explanation:
The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself. With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen
Answer:
this is a very cool day for me yeah know
Network Access Protection (NAP) analyses the ________ of a computer.
Answer:
virus in a virus
Explanation:
Find io(t) for t > 0 in the network in the circuit. (Hint: 1. Find C equivalent first. 2. This is a First Order System)
Answer:
hello your question is incomplete attached below is the complete question
answer : [tex]( 2/3 - 8/3 e^{-1.875t} ) In A \geq 0[/tex]
Explanation:
attached below is a detailed solution
Finding io(t) for t > 0 in the network in the circuit.
[tex]( 2/3 - 8/3 e^{-1.875t} ) In A \geq 0[/tex]
Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction
Answer:
customer-serious orientation
Explanation:
Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.
This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.
Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.
If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the control unit?
A) 8 B) 64C) 128 D) 256
Answer:
D. 256
Explanation:
Given
[tex]Instructions = 8\ bit[/tex]
Required
Determine the maximum number of output
To get the required value, we make use of the following:
[tex]Maximum = 2^n[/tex]
Where n is the bits of the opcode.
i.e.
[tex]n = 8[/tex]
Substitute 8 for n in [tex]Maximum = 2^n[/tex]
[tex]Maximum = 2^8[/tex]
[tex]Maximum = 256[/tex]
Hence, option D answers the question
Which program will have the output shown below?
15
16
17
>>> for count in range(17):
print(count)
>>> for count in range(15, 17):
print(count)
>>> for count in range(15, 18):
print(count)
>>> for count in range(18):
print(count)
Answer:
>>> for count in range(15, 18):
print(count)
is the correct answer
Explanation:
Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the values. The first value inputted is the number of additional data items to input. For instance, if the input is: 3 1 2 3
Answer:
This question is answered using Python programming language
def MaxSet(mylist, count):
if (count == 1):
return mylist[0]
return max(mylist[count - 1], MaxSet(mylist, count - 1))
def MinSet(mylist, count):
if (count == 1):
return mylist[0]
return min(mylist[count - 1], MinSet(mylist, count - 1))
count = int(input("Length of set: "))
mylist = []
for i in range(count):
inp= int(input("Input: "))
mylist.append(inp)
print("Minimum: "+str(MinSet(mylist, count)) )
print("Maximum: "+str(MaxSet(mylist, count)) )
Explanation:
This defines the recursion that returns the maximum
def MaxSet(mylist, count):
This following checks for the maximum using recursion
if (count == 1):
return mylist[0]
return max(mylist[count - 1], MaxSet(mylist, count - 1))
This defines the recursion that returns the minimum
def MinSet(mylist, count):
This following checks for the minimum using recursion
if (count == 1):
return mylist[0]
return min(mylist[count - 1], MinSet(mylist, count - 1))
The main begins here
This prompts user for length of set
count = int(input("Length of set: "))
This defines an empty list
mylist = []
The following iteration gets user input
for i in range(count):
inp= int(input("Input: "))
mylist.append(inp)
This calls the minimum function
print("Minimum: "+str(MinSet(mylist, count)) )
This calls the maximum function
print("Maximum: "+str(MaxSet(mylist, count)) )
Write code that generates a random odd integer (not divisible by 2) between 50 and 99 inclusive.
import random
nums = [x for x in range(50,100) if x%2!=0]
print(random.choice(nums))
We use a list comprehension to create a list of the odd numbers between 50 and 99. Then we randomly choose one of those numbers using the random module.
how do i change my desktop theme on my chromebook?
Answer:
open Chrome.
At the top right, click More. Settings.
Under "Appearance," click Themes. You can also go to the gallery by visiting Chrome Web Store Themes.
Click the thumbnails to preview different themes.
When you find a theme you'd like to use, click Add to Chrome.
Explanation:
Create a formula for sheet Inventory that highlights any rows where the Reorder level is below the On Hand level in yellow on excel 2016. Will mark brainliest if you can tell me how.
Answer:
Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.
Explanation:
Assuming the reorder level (column C4 and the on-hand level or actual inventory (column B starting at row 4) are columns in the Excel worksheet. The reorder level is the minimum level of inventory before inventory is populated. So the formula compares the value of the actual level with the reorder level, if any row is less than or equal to the reorder level, the row is formatted with the selected color.
Answer:
Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.
Explanation:
A technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called:_______
a. assistive instruction.
b. UDL technology.
c. hypertext software.
d. adaptive instruction.
Answer:
c. hypertext software.
Explanation:
In Computer science, a hypertext can be defined as textual informations that are being displayed on a computer system and these texts usually links to other informations (texts) that the user can easily have access to in real-time.
Basically, some developers include encyclopedias and dictionaries in their software database, which makes other necessary informations or contents easier and immediately accessible to the users through the use of hypertexts that is activated by pointing and clicking on the link with a mouse, keypress set or soft touching the screen.
Hence, a technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called hypertext software.
The "persistent interrupt" is a bug in the code that exhibits a behavior that’s similar to an infinite loop. The ISR exits and gets called back immediately an infinite amount of times even though the interrupt event occurred once. The persistent interrupt occurs when three conditions are met. What are these conditions? How do we avoid a persistent interrupt from occurring?
Answer:
1. the 3 conditions have been listed below
2. to avoid persistent interrupt, we break any of the 3 conditions.
Explanation:
The persistent interrupt occurs when these three conditions below are met.
They are as follows:
1. GIE=1
2. xIE=1
3. xIFT=1
in avoidance of the persistent interrupt from occurring, we break any of these 3 conditions that I have listed above.
in order To break any one of the 3 conditions, we clear the flag that corresponds to the associated
we can also avoid the persistent interrupt occurrence by having the Interrupt Service Routine (ISR) clear maybe one or all of the three bits mentioned above before the ISR terminates, so it wouldn't get called back again. clearing any of the bits will not allow the ISR to be called again.