It's not a significant issue, but can bite you in subtle ways.
That 255.255.0.0 is a decimal method to define a 32 bit binary "mask" to separate IP addresses into two parts, the network address and the host address.
This can also be specified by stating the number of bits in the network part of the address, so in this case 192.168.0.0/16.
You need a big enough 'host' part to cover all the hosts that will exist on the network. If we were talking public addresses, then it also matters that you do not claim more addresses than you need, since IP addresses are valuable.
Back in the dark ages of the internet only the /8 /16 and /24 netmasks were valid, but we have long since moved to what is known as "variable length subnet"
However 192.168.0.0/16 alternatively represented by 192.168.0.0 255.255.0.0 is one of address ranges reserved for private networks so will not propagate on the internet, all internet routers should drop traffic to or from that range of addresses (and 10.0.0.0/8 and 172.16.0.0/12).
So you are theoretically perfectly free to use the network setup you have.
The subtleties are things like the DHCP server needing to be able to allocate space for up to 65000 hosts, the arp tables needing to accommodate up to 65000 host addresses, scans of the network taking forever since to define the active hosts on the network you need to check 65000 possibilities.
192.168.0.0/24 is a slice of that private network range that defines an ip address range that provides for 253 hosts, which is usually sufficient for private networks.
I'd probably not pick exactly that one as it's the default for almost every private network set up automatically by domestic routers and and thus is an obvious target for scripted attacks.
Its only a minimal hurdle for an attacker if you pick a less popular range, but it costs you nothing in setting up or use, so why not?
Nice memorable ranges are 192.168.192.0/24 192.168.100.0/24 and similar sized slices out of the 10.0.0.0/8 or 172.16.0.0/12 ranges
Helpful ??
Harry