(Enter the corresponding IP address according to the network category. If you need to convert the entered network address category, select the network type in the forced conversion line. By default, no conversion network type conversion is performed. You can select the number of subnets or one of the hosts in each subnet according to the calculation needs, and then click calculate. The calculation results are shown below. The network type shows whether you have performed network type conversion. The subnet mask, the number of subnets and the number of nodes / hosts in each network are listed below. You can click the list networks button to display the detailed configuration of the network under the given IP address and subnet mask. You can use IE to print the list. (Class A: 1.0.0.0-127.255.255.255 & amp; nbsp; class B: 128.0.0-191.255.255.255 & amp; nbsp; class C: 192.0.0.0-223.255.255.255)
This document contains the following attachments:
Finally, please support genuine software. Registering to buy software from software authors is also a sign of respect for authors and society.
..........................................................
Attachment:
According to the regulations on the protection of computer software on January 1, 2002, in order to learn and
Study the design idea and principle contained in the software, and install, display, transmit or store the software
A person who uses the software by means of software, etc. may not obtain permission from or pay remuneration to the software copyright owner!
A person who uses the software by means of software, etc. may not obtain permission from or pay remuneration to the software copyright owner!
In view of this, I also hope you can study the software according to this description! thank you
※※※※※
Fixed file
Fixed file
notes:
║
╭══════┤
║
║
║
║
║
║
║
║ statement:
║
║
║
║
║
║
║
║
║
║
║
║
║
║
║
║
║
║
║
╰══┤
╰───────────────────────╯
╰───────────────────────╯
..........................................................
..........................................................
In addition, many domestic software and Chinese installation programs bundle rogue plug-ins)