1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
2 years ago
14

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130

hosts per subnet
Computers and Technology
1 answer:
r-ruslan [8.4K]2 years ago
8 0

The greatest number of bits that could be borrowed from the host portion of a class B subnet mask and still have at least 130 hosts per subnet is 10 bits.

<h3>What is subnet mask?</h3>

A subnet mask can be defined as a logical subdivision of an internet protocol (IP) network into a 32-bit number by setting all host bits to 0s and all network bits to 1s.

Ideally, a class B subnet mask is made up of 16 hosts bits per internet protocol (IP) network. Thus, you should determine the number of possible host in a class B subnet mask by using this formula:

Y = 2ⁿ - 2

Y = 2¹⁶ - 2

In conclusion, the greatest number of bits that could be borrowed from the host portion of a class B subnet mask with at least 130 hosts per subnet left is 10 bits.

Read more on subnet mask here: brainly.com/question/8148316

You might be interested in
How can public-key encryption be used to distribute a secret key?
navik [9.2K]
If you encrypt the secret key with someone else's public key, then only that person can decrypt it with his private key. The encrypted content can be freely shared with anyone, however only the intended recipient can retrieve the secret key since he is the only one with the proper private key.
8 0
3 years ago
What is the name used for the camera s view from a single position?
CaHeK987 [17]
The answer to your question is a shot


6 0
3 years ago
How do u get rid of this (the grey box)
slamgirl [31]

Answer:

can't helpnyounddjdjzjzjsjejs jvm d

8 0
3 years ago
Read 2 more answers
Im bored, any anime recommendations? i probably watched whatever youre gonna say
Alex777 [14]

Answer:

Hi..

Explanation:

i have seen a lot of anime shows XD hunter x hunter, dbz, black clover, 7 deadly sins

3 0
3 years ago
Read 2 more answers
Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
Step2247 [10]

Answer:

In the clarification portion below, the definition according to the received information is summarized.

Explanation:

  • <u>Characterization:</u>

It is indeed a summary of general object characteristics in something like a target class and creates characteristic laws.

  • <u>Discrimination:</u>

Just before predefined data types have been held to a different standard from everyone else, it's indeed bias which always happens.

  • <u>Association:</u>

It's a mechanism that determines the possibility that objects in a set will co-occur.

  • <u>Classification:</u>

It is indeed duction which attributes elements to target groups or classes in a set.

  • <u>Prediction:</u>

It is solely dependent on either the interpretation of other similar values to classify data points.

  • <u>Clustering:</u>

It has been used to position the components of the information through their corresponding classes.

  • <u>Evolution Analysis:</u>

It would be for objects whose behavior varies throughout time to explain or design regularities.

5 0
3 years ago
Other questions:
  • If you turn your volume to loud on u'r headphones can it break the sound quality of the speaker?
    9·2 answers
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • When powering off your computer is best down using?
    8·2 answers
  • Match each vocabulary word to its definition.
    11·2 answers
  • Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
    15·1 answer
  • _____ are used to associate a style sheet or style rule with a specific device or list of device features.â
    12·2 answers
  • The function of while loop is
    14·1 answer
  • Super computer in nuclear energy ​
    13·1 answer
  • It is a blueprint of a project​
    9·2 answers
  • How is scale depicted on a flat video screen?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!