A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in?

64

32

128

16



64

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Through the use of set and get member functions, you can validate attempted modifications to private data and control how that data is presented to the caller. b. A client of a class is any other code that calls the class’s member functions. c. Any client code can see a private data member and do whatever it wants with it, including setting it to an invalid value. d. Tightly controlling the access to and presentation of private data can greatly reduce errors, while increasing the usability, robustness and security of your programs.

Computer Science & Information Technology

Write a function that counts the occurrence of each digit in a string using the following header:

int * count(const string &s) The function counts how many times a digit appears in the string. The return value is an array of ten elements, each of which holds the count for a digit. For example, after executing int counts[] = count("12203AB3"), counts[0] is 1, counts[1] is 1, counts[2] is 2, counts[3] is 2. Write a main function to display the count for "SSN is 343 32 4545 and ID is 434 34 4323".

Computer Science & Information Technology

A(n) ____________________ is a special Project 2010 file that contains sample data such as task, resource, cost, and baseline data on which you can create a new Project 2010 file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What length SSL and TLS keys are generally considered to be strong?

A. 128 B. 1024 C. 2048 D. 4096

Computer Science & Information Technology