1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
15

One day your supervisor walks to you, saying: "here is the network ID 192.168.0.0/24, please create three separate networks or s

ubnets for a coffee shop: Sunny Cafe." The three separate subnets/networks are: One is for the office, one for the front desk and storage room, and one is for public use.
Required:
Your task is to list each subnet, network ID, subnet mask, Host ID Range, # of usable host IDs, and Broadcast ID
Computers and Technology
1 answer:
Harrizon [31]3 years ago
8 0

Answer:

See the explanation for the answer

Explanation:

Given, network address is: 192.168.0.0/24

The requirement is to create 3 subnets from this network.

3 is near to 4 in powers of 2 => 22

We need 2 bits for subnetting.

So, total number of network bits are: 24 + 2 = 26 bits

Number of host bits are: 32 - 26 = 6 bits [since total number of bits in a address is 32]

Total number of hosts in a subnet: 26 = 64 hosts

Total number of valid hosts: 64 - 2 = 62 hosts [2 => 1 is for network address and 1 is subnet mask]

    Subnet       Network ID                       Subnet Mask

       1              192.168.0.0/26               255.255.255.192

       2             192.168.0.64/26             255.255.255.192

       3             192.168.0.128/26            255.255.255.192

       4             192.168.0.192/26            255.255.255.192

Subnet Host ID range     #of usable host IDs      Broadcast ID

  1            192.168.0.1 -                    62                      192.168.0.63

               192.168.0.62                        

  2           192.168.0.65 -                 62                     192.168.0.127

               192.168.0.126

 3           192.168.0.129 -                 62                     192.168.0.191

               192.168.0.190

4             192.168.0.193 -                 62                    192.168.0.255

               192.168.0.254

You might be interested in
A manufacturer of machine tools creates a spreadsheet of tools and the cost for those. The spreadsheet has four fields: name of
iragen [17]

The question above has multiple answers:


<span>1.       </span>Sort the data in the field "name of the tool" in ascending order alphabetically.

<span>2.       </span> Sort the data in the field “number of tools” in ascending order.

<span>3.       </span>Sort the data in ascending order of cost per tool.

<span>4.       </span>Sort the data in ascending order of total cost.

The answer is 3. Sort the data in ascending order of cost per tool


You can always make your spreadsheet work a bit more organized by sorting your data. In this case, what is required from the manufacturer of the tools is to sort the data so that someone else is able to find out which tool costs the most. Basically, the price of the tool which is the highest is required to be known. Therefore, the manufacturer of the tools should Sort the data in ascending order of cost per tool.






3 0
3 years ago
Cuando fue creada la aplicación Adobe Photoshop (creada, no lanzada)
Cloud [144]

Answer:

en el año 1991

Explanation:

:)

4 0
2 years ago
How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
AURORKA [14]

Just multiply all numbers to get the total number of bits:

25*50*12 = 15000 bits.

3 0
3 years ago
Question 4 1 pts The following code could be rewritten using: if (x &gt; 12): if (x &lt; 34):​
artcher [175]

Answer:

if(x>12 || x<34)

Explanation:

Mashing the two together using the or '||' operator would allow to run both necessary functions for the next code.

7 0
2 years ago
. Generate 106 message bits (random binary values (bool/int) ). 2. Generate the corresponding code bits for r = 3, 5. This means
N76 [4]

Answer:

While loops are typically used when you don’t know how many times the loop needs to repeat. The body of the loop will repeat while the condition is true. The logical expression will be evaluated just before the body of the loop is repeated.

Let’s say that we want to find the square root of a number. For some square roots, you’re never going to be exact. Let’s say that we want to find a square root that, when multiplied by itself, is within 0.01 of the square we want. How do we do it? There’s a really old process that we can apply here.

Start by guessing 2.

Compute the guess squared.

Is the guess squared close to the target number? If it’s within 0.01, we’re done. We’ll take the absolute value of the difference, in case we overshoot. (In Python, abs is the absolute value function.)

If it’s not close enough, we divide the target number by our guess, then average that value with our guess.

That’s our new guess. Square it, and go back to Step #3.

Explanation:

7 0
3 years ago
Other questions:
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • When storing used oil, it needs to be kept in ___________ containers.
    12·1 answer
  • The IBM nine-track tapes that became the industry standard for storage for three decades had several sizes , the most common bei
    13·1 answer
  • Compound conditions require a computer to sense whether multiple conditions are true or false.
    9·1 answer
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • What are storage devices ​
    5·2 answers
  • How does social network use message to entertain?
    14·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!