Answer:
192.168.228.0 255.255.255.224
Explanation:
192.168.228.0 255.255.255.128
subnet mask: defines the host and the network part of a ip
CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip
For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25
To have atleast 20 hosts
20 ≤ (2^x) -2
x ≈5
with 5 host bits, we have 2^5-2 = 30 hosts per subnet
and 2^3 = 8 subnets
To get the subnet mask, we have 3 network bits
1110000 to base 10 = 2^7 + 2^6 +2^5= 224
192.168.228.0 255.255.255.224
million pairs per week.
Answer:
In this case, the country that produces rye will produce 24 million bushels per week, and the country that produces jeans will produce 64 million pairs per week.
Explanation:
Total labor hour = 4 million hour
Number of bushes produce in 1 hour = 6
⇒total bushes produce = 6*4 = 24 million
∴ we get
The country that produces rye will produce 24 million bushels per week
Now,
Total labor hour = 4 million hour
Number of pairs produce in 1 hour = 16
⇒total bushes produce = 16*4 = 64 million
∴ we get
The country that produces jeans will produce 64 million pairs per week.
Answer:
Identify any program or services that you do not need.
Explanation:
As a network administrator, one of the preventive measures that could be adopted to complement your security system or architecture is to identify all the software applications or services that you do not need in an organization. This is because some of these programs might be a spyware, rootkit or compromised software which are used to gain unauthorized access to the network system. Also, you should identify the unused or unwanted programs or services in order to prevent redundancy and to optimize the performance of critical machines or processes in the organization's network.
Hence, for additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to identify any programs or services that you don’t need.
Answer:
Algorithm:
1.Create a variable N.
2.Read the value of N from user.
3.for i=1 to N.
3.1 Print value of i.
4.end program.
Implementation in C++:
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variable
int N;
cout<<"Enter value of N:";
// read the value of N
cin>>N;
cout<<"Natural number from 1 to "<<N<<" are:";
for(int i=1;i<=N;i++)
{
// print the numbers
cout<<i<<" ";
}
return 0;
}
Output:
Enter value of N:6
Natural number from 1 to 6 are:1 2 3 4 5 6
Python
CSS
Javascript
Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.
The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.
Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.
Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.
Therefore, the correct option is b. Python.
To learn more about computer languages, refer to the below link:
#SPJ2
Answer:
Python
Explanation:
Took the test
Answer:
Written in Python
init1 = input("initials 1: ")
init2 = input("initials 2: ")
init3 = input("initials 3 ")
print(init1+"."+init2+"."+init3)
Explanation:
This line prompts user for init1 and gets the input
init1 = input("initials 1: ")
This line prompts user for init2 and gets the input
init2 = input("initials 2: ")
This line prompts user for init3 and gets the input
init3 = input("initials 3 ")
This line prints out the required output
print(init1+"."+init2+"."+init3)