1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
10

A CIDR block contains the following subnets with the IP addresses of 192.168.68.0/22 192.168.69.0/22 192.168.70.0/22 192.168.71.

0/22
Are there any problems with this group of subnets in the CIDR block?

Why?

Be specific Which subnet(s) are the given addresses in?
Computers and Technology
1 answer:
Dafna1 [17]3 years ago
4 0

Answer:

Yes there is a problem.

Explanation:

Yes there is a problem.

Looking at /22, the host part has 10 bits(right most 10 bits). The subnet mask is:

1111111.11111111.11111100.00000000

The first IP address which is 192.168.68.0 in binary form:

11000000.10101000.1000100.00000000

Here all the 10 bits of host part are 0's. Hence it is a valid network IP address.

192.168,68.0 - This is avalid subnet id

The Next IP address 192.168.69.0 in binary form:

11000000.10101000.1000101.00000000

Here all the 10 bits of host part are not 0's. Hence it is not a valid network IP address for /22 cidr.

Moreover this address lies in the first subnet - 192.168.68.0, which has host addresses in the range of 192.168.68.1 to 192.168.71.254

Hence other IP addresses 192.168.69.9/22, 192.168.70.0/22 and 192.168.71.0/22 lies n the subnet 192.168.68.0/22.

You might be interested in
Does anyone know about ICT? i need help ASAP
Lina20 [59]
ICT means, Information and Communication Technologies

ICT is a borders term for information technology which refers to all communication technologies including the Internet wireless networks, cell phones, computers, software, middleware, video-conferencing, social networking and other media applications and services
4 0
3 years ago
How to deactivate the brainly app?​
galina1969 [7]

Answer:

Don't you just uninstall it?

Explanation:

5 0
2 years ago
Read 2 more answers
How does a MIPS Assembly procedure return to the caller? (you only need to write a single .text instruction).
AnnyKZ [126]

Answer:

A MIPS Assembly procedure return to the caller by having the caller pass an output pointer (to an already-allocated array).

8 0
3 years ago
Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communicati
Vinil7 [7]

Answer: Unified communication

Explanation: Unified communication is the communication technique in which merges various communication routines into a individual business.It works as the phone system which helps in increment of productivity in an organizational business.

The unifying of voice,data/information,video etc is done for optimizing and improving the business that also results in  faster communication rates, secure communication etc.

4 0
3 years ago
JAVA
butalik [34]

Answer:

import java.util.*;

public class MyClass {

   public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       System.out.print("Input a word: ");

       String userinput = input.nextLine();

       for(int i =0;i<userinput.length();i+=2) {

           System.out.print(userinput.charAt(i));

       }

   }

}

Explanation:

This line prompts user for input

       System.out.print("Input a word: ");

This declares a string variable named userinput and also gets input from the user

       String userinput = input.nextLine();

The following iterates through every other character of userinput from the first using iteration variable i and i is incremented by 2

       for(int i =0;i<userinput.length();i+=2) {

This prints characters at i-th position

           System.out.print(userinput.charAt(i));

5 0
2 years ago
Other questions:
  • What is the name for software designed to find and open Web documents?
    8·1 answer
  • What does it mean when your check engine light comes on?
    7·1 answer
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • How do i do a class in java??
    5·1 answer
  • Concept about borderless classroom because of technology​
    9·1 answer
  • Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
    15·1 answer
  • How do I keep my computer and data safe and secure while using the Internet?
    14·2 answers
  • Which view would you need to use to make changes to the design theme for the entire presentation?
    10·2 answers
  • When the CPU performs the work described in the commands,
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!