1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
11

using the class c ip address 195.1.1.0 (class c means that only the last octet can be used for subnet and host addresses, or sta

ted differently, the existing mask is 255.255.255.0).what would the new subnet mask be to establish 10 subnets each with a maximum 12 hosts on each subnet
Computers and Technology
1 answer:
Lelechka [254]3 years ago
5 0

Answer:

Explanation:

Given a class C IP address

195.1.1.0

Existing mask is 255.255.255.0

We want to have 12 hosts on 10 subnets.

A class C address has 8 bits of the host which will give, n=8

2ⁿ - 2 = 254 hosts

Current mask= 255.255.255.0

Bits needs for 10 subnets

2ⁿ = 10, n = 4bits

n = 4 = 2⁴ = 16 possible subnets

Now, bit needed for 12host, n =4bits

2⁴-2 = 14 possible host,

Total of 8 bits needed so therefore we can use as 4bits for the subnet.

So we could have

4 bit subnet and 4 bits hosts

11110000 = 240decimals

Final possible masks is

255.255.255.240

You might be interested in
A(n) _____________ is a program used to create and implement a database. operating system database management system information
Anika [276]

The program used to create and implement a database is called an operating system.

<h3>What is an operating system?</h3>

An operating system (OS) is a system that helps to manage and allocate computer resources. These computer resources are:

  • Central processing unit (CPU),
  • Computer memory,
  • File storage,
  • Input/output devices,
  • Network connections.

The most used operating system are;

  • Apple mac OS,
  • Microsoft Windows,
  • Go-ogle Android OS,
  • Lin-ux Operating System,
  • Apple iOS

Learn more about operating system:

brainly.com/question/24032221

5 0
3 years ago
In an If-Then-Else statement, the Else clause marks the beginning of the statements to be executed when the Boolean expression i
kari74 [83]

Answer:

False

Explanation:

The definition for the If-Then-Else structure is as follows:

IF (<em>boolean_condition</em>)  

THEN (<em>commands_for_true</em>)  

ELSE (<em>commands_for_false</em>)

When there is an ELSE sentence, its commands are to be executed whenever previous conditions where not evaluated as true .

7 0
3 years ago
My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H
denpristay [2]

Answer:

hey! that happens to me too!

Explanation:

tbh i just think its whenever you comment on something and someone answers, that appears... but i could be wrong.

lol :)

4 0
3 years ago
Read 2 more answers
After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
Gekata [30.6K]
Cacky fart face diareaah and farts= mc2 because  youfhvh h h h hh h h hh h h h h hh h h hh h hh h h snd that is the answer rk rjhd wkesryn
8 0
3 years ago
A top level class without any modifier is accessible to
LenKa [72]

Answer: A top level class without any modifier is accessible to any class within the same package.

Explanation: A top level class is class whose declaration occur in the body of their own class therefore it is not a nested class.It cannot be declared in any other class.Private modifier is not allowed in the top level class because there would be no access in the class. Therefore top level class which does not have any modifier can be accessed by any class within the same package .

4 0
4 years ago
Other questions:
  • The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case a
    15·1 answer
  • LAN security policies center on issues concerning connectivity; this includes determining how devices adhere to the network. Amo
    14·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    6·1 answer
  • Domestic refers to things that happen __________ of the united states
    15·2 answers
  • Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All o
    12·1 answer
  • How could you represent the following binary color in hexadecimal? What is its numerical value? What color is it? How
    13·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
  • How does defragmentation improve performance?
    9·1 answer
  • Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n
    14·1 answer
  • You need to design an online login form in which users have to type their name and password to log into an application. The pass
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!