1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
15

One day your supervisor walks to you, saying: "here is the network ID 192.168.0.0/24, please create three separate networks or s

ubnets for a coffee shop: Sunny Cafe." The three separate subnets/networks are: One is for the office, one for the front desk and storage room, and one is for public use.
Required:
Your task is to list each subnet, network ID, subnet mask, Host ID Range, # of usable host IDs, and Broadcast ID
Computers and Technology
1 answer:
Harrizon [31]3 years ago
8 0

Answer:

See the explanation for the answer

Explanation:

Given, network address is: 192.168.0.0/24

The requirement is to create 3 subnets from this network.

3 is near to 4 in powers of 2 => 22

We need 2 bits for subnetting.

So, total number of network bits are: 24 + 2 = 26 bits

Number of host bits are: 32 - 26 = 6 bits [since total number of bits in a address is 32]

Total number of hosts in a subnet: 26 = 64 hosts

Total number of valid hosts: 64 - 2 = 62 hosts [2 => 1 is for network address and 1 is subnet mask]

    Subnet       Network ID                       Subnet Mask

       1              192.168.0.0/26               255.255.255.192

       2             192.168.0.64/26             255.255.255.192

       3             192.168.0.128/26            255.255.255.192

       4             192.168.0.192/26            255.255.255.192

Subnet Host ID range     #of usable host IDs      Broadcast ID

  1            192.168.0.1 -                    62                      192.168.0.63

               192.168.0.62                        

  2           192.168.0.65 -                 62                     192.168.0.127

               192.168.0.126

 3           192.168.0.129 -                 62                     192.168.0.191

               192.168.0.190

4             192.168.0.193 -                 62                    192.168.0.255

               192.168.0.254

You might be interested in
Need help asap please​
Fofino [41]
Because you can make it to where they cannot find or see or look or talk or anything on your profile it can cut off Comunication from the person. It can also protect your safety!
6 0
3 years ago
Answer for 3.4.8 rectangle code HS
tigry1 [53]

Answer:

i think Make variables to represent the length and width of a rectangle, called length

and width

, respectively. You should set length

to 10 and width

to 5.

Then, write some mathematical expressions to computer the area and perimeter of the rectangle and save these values inside variables named area and perimeter

.Use print

statements to display the area and perimeter of the rectangle.

Your output should print the area on the first line and the perimeter on the second, like this:

50 30  Rectangle Area Formula:

Area = L * W

Explanation:

7 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
What is the software that provides the mechanisms to access a database called?
NeX [460]

Answer:

Database Management Software.

Explanation:

The software that provides  the mechanism to access the database is called  Database Management Software.There are two types databases  SQL  and  No SQL.There are various types of  database Management Software  present online for ex:-My SQL,Microsoft SQL server,Microsoft Access,Postgres SQL,Mongo DB etc.

3 0
3 years ago
A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o
kobusy [5.1K]
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




8 0
3 years ago
Other questions:
  • Which expense is a bank least likely to extend a line of credit for?
    13·2 answers
  • What is the purpose of an arraignment?
    9·2 answers
  • If metal shims are used for alignment adjustment in the front, they adjust ________.
    5·1 answer
  • How long does it take to be placed in a class on flvs?
    14·1 answer
  • Java can be used to create which of the following technologies?This task contains the radio buttons and checkboxes for options.
    5·1 answer
  • What should you do to help prepare yourself for the delivery of your presentation? you can chose more then one
    8·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    6·1 answer
  • Whats the most popular social networking in the philippines?
    10·1 answer
  • Algorithm to calculate the area of a square.​
    6·1 answer
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!