1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
14

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130

hosts per subnet
Computers and Technology
1 answer:
r-ruslan [8.4K]3 years ago
8 0

The greatest number of bits that could be borrowed from the host portion of a class B subnet mask and still have at least 130 hosts per subnet is 10 bits.

<h3>What is subnet mask?</h3>

A subnet mask can be defined as a logical subdivision of an internet protocol (IP) network into a 32-bit number by setting all host bits to 0s and all network bits to 1s.

Ideally, a class B subnet mask is made up of 16 hosts bits per internet protocol (IP) network. Thus, you should determine the number of possible host in a class B subnet mask by using this formula:

Y = 2ⁿ - 2

Y = 2¹⁶ - 2

In conclusion, the greatest number of bits that could be borrowed from the host portion of a class B subnet mask with at least 130 hosts per subnet left is 10 bits.

Read more on subnet mask here: brainly.com/question/8148316

You might be interested in
Which statement regarding socializers is true?
allochka39001 [22]

Answer:

The answer is: they are comparable to suit of hearts

Explanation:

The answer is: they are comparable to suit of hearts

7 0
3 years ago
Read 2 more answers
Discuss how the user-designer communications gap can cause a good project to go bad.
Mila [183]
This gap between user-designer communications <span>can cause a good project to go bad i</span>f the user is not able to process what is required to be fixed in order for the project to run smoothly. The user may have one way of fixing something while the designer has another. In this case, the designer understands how the project fully works while the user does not and this may end up compromising the whole project.

The law that “designers are not users” and “users are not designers” should always be followed.




3 0
4 years ago
Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
oee [108]
  1. Answer: import java.util.Scanner; public class CharTestt {     public static void main(String[] args) {     System.out.println("Please enter a character ");     Scanner input = new Scanner(System.in);     char letterStart = input.next().charAt(0);     char thenextChar = (char)(letterStart+1);     System.out.print(letterStart);     System.out.println(thenextChar); } } Explanation: Import Scanner Class Prompt user to enter a character Read and save user's input in a variable char letterStart = input.next().charAt(0); Knowing that the next character using ASCII is +1, create a new character variable and add 1 print the character entered and the new character all on same line without spaces
5 0
4 years ago
The function keys are labeled from f1 to wat
Fed [463]
If we are talking about a simple North American Keyboard, The answer would be F1 to F12
Hope this Helps!!!
8 0
3 years ago
PREDATION AND EVOLUTION
choli [55]

Answer:

Yes, it is correct. God is great. He gives pain but gives the ointment as well to get rid of it. God gives tougher challenges, but God also gives the guts to tackle them and win them. The story of adaptation, ad predator also goes like this. God gives spines to sea urchins to survive, and it gives the birds stronger beaks to break shells. Similarly, he gives programmers awesome brains to solve the toughest problems.

Explanation:

Please check the answer.

3 0
3 years ago
Other questions:
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • What are the data types used in C programming with examples
    5·1 answer
  • How do you represent images in binary
    6·2 answers
  • A) A cable that is mainly used in the cable television network
    11·1 answer
  • Your team will write a function that reverses a C-string, to practice using pointers. You must use pointers and C-strings for th
    6·1 answer
  • Digital on a smart phone means the camera is actually zooming in on the photo itself not the subject that you are shooting true
    8·1 answer
  • If anyone gotta ps4, i'm a 15 yr old female n if u wanna b frens, hmu :))
    8·2 answers
  • Write a python program that will read a number (num) and display all the numbers divisible by 3 or 5
    15·1 answer
  • John has recently retired from an administrative, yet technical job which he held for 40 years. He decided to pursue a life-long
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!