1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
4 years ago
13

You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m

ust you borrow from the host portion of a classful network address to provide the correct subnet mask?
A) 2
B) 3
C) 4
D) 5
Computers and Technology
1 answer:
Tomtit [17]4 years ago
7 0

Answer:

Option D) 5

Explanation:

4 subnet bits is 240 mask which provides 2^{4}, i.e., 16 subnets and provides 14 hosts for each.

In order to achieve the target and provide correct subnet mask, 5 subnet bits are required to be borrowed from the host of a classful network address as then the addition of one more subnet bit would result in 248 mask which in turn gives 5 subnet bits which results in 2^{5}, i.e., 32 subnets and 3 host with 6 host per subnet.

You might be interested in
Interpret the poem 'the popular field'as a definse of natural conservation​
olga2289 [7]

Answer:

<em><u>Consider the poem “The Poplar Field” as a defense of nature conservation. This poem is a defense of nature conservation. The poet's message is that trees shouldn't be cut down recklessly. ... The poet also says that though we can plant trees, they don't grow as fast as the trees are being cut down in the present time.</u></em>

Explanation:

7 0
3 years ago
What careers are most likely to require business skills
olchik [2.2K]

i would say maybe an accountant, entrepreneur, business reporter, or something like that.

8 0
3 years ago
In C complete the following:
Crazy boy [7]

Answer:

#include <stdio.h>

void printValues ( unsigned char *ptr, int count) // count is no of cells

{

 for(int i=0; i<count; i++) {

   printf("%d ", ptr[i]);

 }

}

int main ( )

{

 unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;

 printValues( data, sizeof(data)/sizeof(data[0]) );

}

Explanation:

Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.

3 0
3 years ago
Write a method, makeSubjectLine, that gets a String argument and returns the same String but with "Subject: " in front of it. So
Anna [14]

Answer:

public class newass {

   /*

   Write a method, makeSubjectLine, that gets a String argument and returns the same String but with "Subject: " in front

   of it. So if the argument is "Are you going to the show?" the method returns "Subject: Are you going to the show?".

    */

   public static void main(String[] args) {

       System.out.println(makeSubjectLine("Are you going to the show?"));

   }

   public static String makeSubjectLine(String subj){

       return "Subject: "+subj;

   }

}

Explanation:

The solution in Java Programming Language

6 0
3 years ago
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
love history [14]

Answer:

The answer is False

Explanation:

IOT or Internet of things refers to the multiple devices in the world today, which are connected to the internet, they gather and share specific information. Any physical object can become an IOT device once it can be connected to the internet to control its data.

Since, the business is involved in utilities, critical infrastructure, or environmental services, it will not benefit from traffic-monitoring applications.

7 0
4 years ago
Other questions:
  • Mary’s computer is running slow and will not load programs or videos. She has tried restarting her computer yet it is still not
    15·1 answer
  • Write a statement containing a logical expression that assigns true to the
    13·1 answer
  • Discuss and compare shared and switch Ethernet
    12·1 answer
  • Write programs with loops that compute:
    12·1 answer
  • Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
    8·1 answer
  • A woman puts on a business suit. Which post-WWII fashion does her clothing typify?
    12·2 answers
  • The original creators of Android were ____________.​
    8·1 answer
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • How to download film​
    14·2 answers
  • You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!