1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
4 years ago
7

You work as a network administrator for a company with 100 employees. Your company need all the employees should have a separate

computer and connected to the network. (a) What is the smallest size address block that can support the all the 100 computers servers and routers in your perimeter network? (Express the network size in slash notation and dotted-decimal notation.) (b) You have decided to deploy three new servers in the perimeter network and assign them each a public IP address. If your provider sells addresses in blocks only, what size block should you request to enable you to host all of your public servers on a single subnet?(c) Are the IPv4 address 192.158.1.14 and 192.158.1.127 on the same subnet? Both have a subnet mask of 255.255.255.0
Computers and Technology
1 answer:
grandymaker [24]4 years ago
4 0

Answer:

gdghfhffhgcgchchghvb. bvhvhhvhvhgcgfhsufsjtstjsfsfshrs

You might be interested in
What is the current situation of drone technology in emergency rescue and recovery
vitfil [10]

Drones are now being used by researchers, notably those at the University of Montana, to forecast how to respond to disasters, particularly forest fires. Drones are equipped with sensors that can monitor wind speed and direction, position, location, humidity, and temperature. Major utility companies are looking into how technologies like drones and artificial intelligence may help to lower the likelihood of future fires and for infrastructure assessment to help minimize fire risk. Drones are now being used by California's emergency services to help find forest fires, which can help determine the kind and quantity of supplies needed on the site. Drones can be equipped with thermal detection sensors, which utilize infrared light to identify heat signatures and aid first responders find hotspots for fires.

7 0
2 years ago
What is different between attaching a file on an email program versus a smartphone?
Veronika [31]
D is the answer
Hope this helps!
7 0
3 years ago
Read 2 more answers
Why is computer called information processing maching???​
Vaselesa [24]

☆ <u>Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).</u>

HOPE IT HELPS ❣️

7 0
3 years ago
Read 2 more answers
Which command on the page layout ribbon enables a user to mark where a new page will begin on the printed copy?
tatiyna
The page break is the command on the page layout ribbon enables a user to mark where a new page will begin on the printed copy
3 0
3 years ago
Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
pashok25 [27]

Answer: Incident response plan

Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.

Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.

7 0
4 years ago
Other questions:
  • Group technology identifies components by a coding scheme that specifies the
    13·1 answer
  • What are sums of money that are given out for specific reasons?
    5·2 answers
  • Which type of memory helps in reading as well as writing data?
    7·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • What are some other features of sending attachments in Outlook 2016? Check all that apply.
    9·2 answers
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
  • When using the protection options in Excel 2016, what does the Protect Workbook function do?
    8·2 answers
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
  • A protocol stack is _____.
    11·2 answers
  • C code
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!