1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
12

____ gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can there

fore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.
Computers and Technology
2 answers:
Sedbober [7]3 years ago
7 0

<u>Classless Inter-Domain Routing</u> gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

<u>Explanation</u>:

A router is a networking device that helps in connecting multiple networks. <em><u>Classless Inter-Domain Routing (CIDR) </u></em>is used for creating IP addresses and IP routing. CIDR was introduced in the year 1993 by <em><u>“The Internet Engineering Task Force”</u></em>. The classful network design was replaced by CIDR in the Internet.

The IP addresses are responsible for sending the particular information packets to specific computers. Classless inter-domain routing helps in improving the allocation of IP addresses.

poizon [28]3 years ago
7 0

<u>Classless Inter-Domain Routing </u>gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

Explanation:

CIDR refers to the  Classless Inter-Domain Routing

It  is  a type of an IP addressing scheme that improves the allocation of IP addresses. It it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

The problem with the old method of IP routing was that  an error would occurred  whenever  an organization required more than 254 host machines and hence it would no longer fall into class C category  but it will fall in  class B category . which meant that   the organization needs to use a class B license even if they have less than 65,535 hosts. thus if an organization  requires only  2,500 hosts, they end up  wasting 63,000 hosts by holding a class B license which further  decrease the availability of IPv4 addresses .

You might be interested in
What happens when the computer is thrashing? quizzlet?
lutik1710 [3]
When computers need to use more memory than have RAM, they'll swap out pages of memory to their drive. When they need those memory pages, they'll swap out others and swap in the needed ones. If a computer needs enough additionall memory, it can get so busy swapping that it doesn't have any (or very little) time to do any useful work. That is called thrashing.

Unix calls swapping swapping. Windows calls it paging, probably because of the memory pages. Memory pages are 4096 (4KB) sections of memory.

Unix drives are usually partitioned with a swap partition, and swap files can be made in the filesystem. Windows just has pagefiles[s].
5 0
4 years ago
In a study on software license infringement, those from United States were significantly more permissive than those from the Net
daser333 [38]

Answer:

The answer is "False"

Explanation:

In the given statement some information is missing, that is options "true or false", which can be described as follows:

The software suite breach has become a lawful effort, that arises as just a consequence of piracy, in which the court charges resulting as a condition of piracy is the patent license violation charge. Its use, replication or sharing of proprietary technology is not allowed as online piracy.

  • It enables firms to provide their operating systems more effectively.  
  • In this the US was rather more strict, than the Netherlands and other countries, that's why the given statement is false.
8 0
3 years ago
Suppose company A wants to develop a program that duplicates the functionality of a programm by company B. Describe how company
kompoz [17]
The design of the software is covered by copy right unless it is open sourced or is a very common interface. They would need to come up with their own design and way of solving the problem to have a solution that was not copyrighted.
5 0
4 years ago
Which type of password would be considered secure?
Annette [7]
A strong password obeys some password rules, such as:
- minimum length
- using characters from different classes (uppercase, lowercase, numbers, typographic characters)

Your safest bet these days is to use a password manager and have it generate one for you, so that hackers can not guess it by understanding humans' predictable mind. ;-)
6 0
3 years ago
What science category includes physics and biology?
enyata [817]

Answer:

Physical science is the study of the inorganic world. That is, it does not study living things. (Those are studied in biological, or life, science.) The four main branches of physical science are astronomy, physics, chemistry, and the Earth sciences, which include meteorology and geology.

5 0
3 years ago
Other questions:
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • a corporation needs an operating system that allows the various teams in its office to network &amp; collaborate on projects. wh
    11·2 answers
  • How can I code this in Python with only if-statements? (Only allowed to use the built-in functions int(), float(), and str().)
    8·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
    15·1 answer
  • What is the by stander effect
    9·1 answer
  • What is a document you can create with word-processing software
    9·1 answer
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
  • I need help with this question.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!