One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54​

Answers

Answer 1

Answer:

D.191.23.21.54

Explanation:

Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address

(Please heart the answer if you find it helpful, it's a motivation for me to help more people)


Related Questions

Define a class named Money that stores a monetary amount. The class should have two private integer variables, one to store the number of dollars and another to store the number of cents. Add accessor and mutator functions to read and set both member variables. Add another function that returns the monetary amount as a double. Write a program that tests all of your functions with at least two different Money objects.

Answers

Answer:

#include<iostream>

using namespace std;

class Money{

    private:

        int dollars;  

       int cents;

   public:

       Money(int d=0, int c=0){

          setDollar(d);

          setCent(c);

       }

       void setDollar(int d){

           dollars = d;

       }

       void setCent(int c){

           cents = c

       }

       int getDollar() {

           return dollars;

       }

       int getCent() {

           return cents;

       }

       double getMoney(){

          return (dollars + (cents/100));

       }

};

// testing the program.

int main(){

  Money Acc1(3,50);

  cout << M.getMoney() << endl;

  Money Acc2;

  Acc2.setDollars(20);

  Acc2.setCents(30);

  cout <<"$" << Acc2.getDollars() << "." << Acc2.getCents() << endl;

  return 0;

}

Explanation:

The C++ source code defines the Money class and its methods, the class is used in the main function as a test to create the instances of the money class Acc1 and Acc2.

The object Acc2 is mutated and displayed with the "setDollar and setCent" and "getDollar and getCent" methods respectively.

Computers has done more harm than good​

Answers

Explanation:

Teueeeeeeeeeeeeeeeeeee

Nolur acil lütfen yalvarırım sana

Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.

>>> permutations([1, 2])

[[1, 2], [2, 1]]

>>> permutations([1, 2, 3])

[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]

>>> permutations([1, 2, 3, 4])

[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],

[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],

[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],

[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],

[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],

[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]

Answers

Answer:

def permutations(myList: list)-> list:  

   if len(myList) <= 1:  

       return [myList]  

   perm = []  

   for i in range(len(myList)):  

      item = myList[i]  

      seglists = myList[:i] + myList[i+1:]  

      for num in permutations(seglists):  

          perm.append([item] + num)  

   return perm

 

data = [1,2,3]  

result = permutations(data)  

print(result)

Explanation:

The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.

The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.


In the central processing unit (CPU).
A) Causes data to be input into the system
B) Responsible for the logical order of processing and converting data.
C) Both
D) None of the above

Answers

Answer : B.responsible for the logical order of processing and converting daya

Reason

As i said bro, in CPU there are ALU and CU where ALU is to do mathematics problem and CU where its to processing, converting data. CPU is like the brain of computer. But it can't be the input, the input can get through hardware, not CPU.

This component of the CPU is responsible for fetching the data, converting it, and de-converting
A) ALU
B) RAM
C) Control Unit
D) None of the above

Answers

Answer : C.Control Unit

Reason

In CPU there are two components name ALU and CU(Control unit) which ALU's function is to solve mathematic sequence and CU fuction is to vetch data to memory and manage commands and input & output.

#See pic for how the data proceed

Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Package A: For $9.95 per month 10 hours of access are provided. Additional hours are $2.00 per hour. Package B: For $14.95 per month 20 hours of access are provided. Additional hours are $1.00 per hour. Package C: For $19.95 per month unlimited access is provided. Write a program that calculates a customer's monthly bill. It should ask which package the customer has purchased and how many hours were used. It should then display the total amount due. Input Validation: Be sure the user only selects package A, B or C. Also, the number of hours used in a month cannot exceed 744. Use switch.

Answers

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   int hour; char pkg; float bill = 0;

   cout<<"Package: "; cin>>pkg;

   cout<<"Hour: "; cin>>hour;

   if(hour<=744 && hour >=0){

       switch (pkg) {

           case 'A':

               bill = hour * 9.95;

               if(hour >10){bill = 10 * 9.95 + (hour - 10) * 2;}

           break;

           case 'B':

               bill = hour * 14.5;

               if(hour >10){bill = 20 * 14.5 + (hour - 20) * 1;}

           break;

           

           case 'C':

               bill = 19.95;

           break;

           

           default:

               cout << "Package must be A, B or C";}

cout<<"Total Bills: $"<<bill; }

else{ cout<<"Hour must be 0 - 744"; }

return 0;

}

Explanation:

This declares all variables:    int hour; char pkg; float bill=0;

This prompts the user for package type:  cout<<"Package: "; cin>>pkg;

This prompts the user for number of hours:    cout<<"Hour: "; cin>>hour;

This checks if hour is between 0 and 744 (inclusive)

   if(hour<=744 && hour >=0){

If true, the following is executed

A switch statement to check valid input for package

       switch (pkg) {

For 'A' package

           case 'A':

Calculate the bill

               bill = hour * 9.95;

               if(hour >10){bill = 10 * 9.95 + (hour - 10) * 2;}

End of A package:            break;

For 'B' package

           case 'B':

Calculate the bill

               bill = hour * 14.5;

               if(hour >10){bill = 20 * 14.5 + (hour - 20) * 1;}

End of B package:            break;

For C package            

           case 'C':

Calculate bill:                bill = 19.95;

End of C package:            break;

If package is not A, or B or C

           default:

Prompt the user for valid package                cout << "Package must be A, B or C";}

Print total bills: cout<<"Total Bills: $"<<bill; }

If hour is not 0 to 744: else{ cout<<"Hour must be 0 - 744"; }

State and give reason, if the following variables are valid/invalid:
Variables defined in Python
Valid/Invalid
Reason
daysInYear


4numberFiles


Combination-month_game


Suncity.school sec54


Answers

Answer:

See Explanation

Explanation:

Variable: daysInYear

Valid/Invalid: Valid

Reason: It begins with a letter; it is not a keyword, and it does not contain a hyphen

Variable: 4numberFiles

Valid/Invalid: Invalid

Reason: It begins with a number

Variable: Combination-month_game

Valid/Invalid: Invalid

Reason: It contains a hyphen

Variable: Suncity.school sec54

Valid/Invalid: Invalid

Reason: It contains a dot and it contains space

1
When collection of various computers
look like a single coherent system to its
client, then it is called​

Answers

Answer:

The appropriate answer is "Distributed system".

Explanation:

Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of  mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.

1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented​

Answers

a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc

Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of action.

You are a new salesperson at a large software manufacturing firm. It is three weeks from the end of the sales quarter and you and your sales manager are sitting pretty—you have both already met your sales quota for the quarter. In addition, you just closed another deal with a new customer for $100,000 of software and customer service. This order would put you way over your sales quota for the current quarter. Your manager suggests that you hold this new order so it gets recorded against next quarter. She explains that because sales during the next three months tend to slow down, salespeople frequently miss their quotas and associated sales bonuses for that quarter. Holding this large order to next quarter would help you get an excellent start and almost guarantee that you meet your quota. What would you do?

Answers

Answer:

The responses to this question can be defined as follows:

Explanation:

Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.

What are the two choices for incorporating or removing changes when reviewing tracked changes made to a document?
Edit or Apply
Revise or Accept
Accept or Reject
Incorporate or Edit

Answers

Answer:

Accept or Reject

Explanation:

The only way to get tracked changes out of the documents is to accept or reject.

So, the correct option is - Accept or Reject

Answer:

C. Accept or reject

Explanation:

Which artistic technique uses multiple layers of small calligraphic or scribbled marks?
A. random hatching
B. crosshatching
C. shading
D. stippling
E. scrumbling

Answers

I would go with C.shading. It just makes the most sense

Answer:

E. scrumbling

Explanation:

what, if anything, is returned by the method call rearrange ("apple")?

Answers

Answer:

[tex] \boxed{E} \to \boxed{nothing \: is \: returned \: due \: to \: run \: tie \: error}[/tex]

A data science experiment you are conducting has retrieved two historical observations for the price of Bitcoin(BTC) on December 2, 2017 of 11234 and 12475. Create a Python script that stores these two historicalobservations in a list variable namedbtcdec1.

Answers

Answer:

In Python:

btcdec1 = []

btcdec1 = [11234, 12475]

print(btcdec1)

Explanation:

First, create an empty list named btcdec1

btcdec1 = []

Next, insert the two data (11234 and 12475) into the list

btcdec1 = [11234, 12475]

Lastly, print the list

print(btcdec1)

where are all of your documents saved?

Answers

Answer:

create a my document folder so you can easily find it

Use EBNF notation to describe the syntax of the following language constructs.
A. A Java return statement, which could be either a return keyword followed by a semicolon, or a return keyword followed an expression then followed by a semicolon. Assume the grammar for expression has been defined as expr-> e
B. A Python return statement, either a return keyword, or return one or more expressions separated by comma.
C. Based on your syntax definition in (b), is return x+y; a valid Python return statement?

Answers

Answer:

Following are the description to the given points:

Explanation:

To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.

To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.

Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link.  That's why in Option (a):

The return statement in Java is:

return ('”‘ (~[“] | ” [”e‘])*);

In option (c), it is the valid statement.

6n^3+n-2 C++ code using Dev
i need only the code

Answers

Answer:

A = 6*pow(n,3) +n - 2

Explanation:

I'm not sure if this what you need but that's what I can help you with :)

Which term describes the surrounding area of this image?

The surrounding area of this image is called
Surroundings
Foreground
Background

This area is also called a
Negative
Positive
Neutral

Answers

Answer: background/negative

Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.

I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?

Answers

Yes u need more brackets

Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==

. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Explanation:

d answer

gzjxubejeiizbtozueg

which internet service is the main reason the internet has expanded and what draws newcomers to the internet?

Answers

Answer:

It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized

Social media.

The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.

These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.

Learn more in https://brainly.com/question/21765376

The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.

Answers

Answer:

kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h

Explanation:

Answer:

is this even a legit question

What is htc one mseven​

Answers

"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"

1. Which of the following is used to operate computers and execute tasks?
A. Software
C. Update
B. Application
D. Upgrade

Answers

I wish I could get the new app to play this app and it is great for the iPad version

Answer:

a.software

I hope it hel

A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?

Answers

Answer:

it is

Explanation:

400 dollars for 10 systems and 200 dollars for 5 systems

explanation

first

find the price of 1 system or computer which is done by dividing 1000 by 25

25)1000(40

100

____

00

00

__

0

then multiple it by 10 =40 ×10=$400

Answer:

400!!

Explanation:

Checkpoint 4.20 Assume hour is an int variable. Write an if statement that displays the message “Time for lunch” only if hour is equal to 12.

Answers

Answer:

if(hour == 12)

{cout << "Time for lunch";}

Explanation:

It is important to create a strong password because it will

let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus

Answers

Keeps your private information safe and secure...
PLP 2021

Which of the following would be considered software? Select 2 options.
memory
printer
operating system
central processing unit (CPU)
Microsoft Office suite (Word, Excel, PowerPoint, etc.)
Thing

Answers

Answer:

Microsoft Office suite (Word, Excel, PowerPoint, etc.), and thing

Explanation:

The Operating system and Microsoft Office suite will be considered as software.

A Software is the opposite of Hardware in a computer system.

Let understand that Software means some set of instructions or programs on a computer which are used for operation and execution of specific tasks.

There are different type of software and they include:

Application Software are software installed into the system to perform function on the computer E.g. Chrome.System Software is the software designed to provide platform for other software installed on the computer. Eg. Microsoft OS. Firmware refers to set of instructions programmed on a hardware device such as External CD Rom.

In conclusion, the Operating system is a system software while the Microsoft Office suite is an application software.

Learn more about Software here

brainly.com/question/1022352

can anyone teach me the basics of lua scripts 50 points
like how do i tell lua to move a object or send me a prompt asking me to do something

Answers

Answer:

are you talking about about a game, or coding?

list out various computer generation long with their basic characteristic ​

Answers

Answer:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – Microprocessors

Explanation:

there are 4 generations ok

please mark me as brainlist

Other Questions
How many times greater is the area of Circle 1 than the area of Circle 2?If circle ones radius is 9 and circle twos radius is 3 Find the area of this figure Acil cevap ltfen hemen atarsanz sevinirim (^^) what is (7x3)-2(5+1)+4 Which statement describes how the atmosphere gains energy by convection?(1 point)Air warmed by the ground rises. The ground warms the air just above it.Solar energy warms gases that make up the air.Energy moves from the clouds to the air. Someone please hurry, I have no idea what I am doing I NEED HELP WITH THIS ASAP!!!!Lillian is in the business of manufacturing phones. She must pay a daily fixed cost to rent the building and equipment, and also pays a cost per phone produced for materials and labor. Let CC represent the total cost, in dollars, of producing pp phones in a given day. The table below has select values showing the linear relationship between pp and C.C. Determine the fixed cost for rent and equipment.P C2 12004 16006 2000 Why was plutonium production important in the early days of the [Hanford] site? Check all that apply.A) It was used to manufacture guns and ammunition.B) It was the first step in the process of making uranium.C) It was used to produce power at the Grand Coulee Dam.D) It helped the United States and its allies win World War II.E) It was an important ingredient for building an atomic bomb. Graph the following Line:6x+3y=6 lee el texto y sustituye las palabras resaltadas por frases adverbiales que expresen temporalidad which of the following does not correctly describe Charles Dickens?A. a mid-nineteenth-century author whose writing about urban squalor helped spur reformB. Writer of a series of stories about the lives of the British aristocracy C. Author of A Christmas Carol, Oliver Twist, Bleak House, and Little DorritD. Wrote about the fictional Industrial city of Coketown in his 1854 novel, Hard Times A trader makes a loss of 10% when he sells a watch for 15,300what did it cost? Of two disparate disperate phenomena that surprisingly have the same or at least a related explanation Please help me with this biology question........... Chloroplasts are present in some plant cells only Give an example of plant cells that do not contain chloroplasts and explain why what is valence electron configuration for group 4A (14) 6. If ABCD is a square and AD = 11. find each missing value.BBC=mZDAB =AC =m2AEB =BD =mZCBD =EC =mZBAC =D 12. Based on the previously given definitions of a primate city, what is Greeces primate city?A)Milan B)Piraeus C)Athens D)Larisa What is the least common multiple of 36 and 90? I'm in seventh grade and this is a new concept for me I need help! 50 points!!!!!!!!!Solve for x and y!!! Please help i will give crown!