1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
4 years ago
10

A CIDR block contains the following subnets with the IP addresses of 192.168.68.0/22 192.168.69.0/22 192.168.70.0/22 192.168.71.

0/22
Are there any problems with this group of subnets in the CIDR block?

Why?

Be specific Which subnet(s) are the given addresses in?
Computers and Technology
1 answer:
Dafna1 [17]4 years ago
4 0

Answer:

Yes there is a problem.

Explanation:

Yes there is a problem.

Looking at /22, the host part has 10 bits(right most 10 bits). The subnet mask is:

1111111.11111111.11111100.00000000

The first IP address which is 192.168.68.0 in binary form:

11000000.10101000.1000100.00000000

Here all the 10 bits of host part are 0's. Hence it is a valid network IP address.

192.168,68.0 - This is avalid subnet id

The Next IP address 192.168.69.0 in binary form:

11000000.10101000.1000101.00000000

Here all the 10 bits of host part are not 0's. Hence it is not a valid network IP address for /22 cidr.

Moreover this address lies in the first subnet - 192.168.68.0, which has host addresses in the range of 192.168.68.1 to 192.168.71.254

Hence other IP addresses 192.168.69.9/22, 192.168.70.0/22 and 192.168.71.0/22 lies n the subnet 192.168.68.0/22.

You might be interested in
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
We can include following item(s) during configuration itemidentification:
Ainat [17]

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

  • All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
  • The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
  • Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
5 0
4 years ago
Successful Web sites such as StumbleUpon ( www.stumbleupon) and Digg ( www.digg) use ____ by inviting their visitors to vote on
aliina [53]

Answer:

"Crowdsourcing" is the correct answer for the above question.

Explanation:

  • Crowdsourcing is a term from which any organization advertises the thinks or can get the ideas or solutions for any particular problem.
  • It is a term that refers to the problem to the number of solvers to achieve the result correct and frequent.
  • For example, If anyone wants to prepare the two websites. Then he assigns the works to the number of people and the works done faster with the help of this.
  • The above question states that some websites can be successful with the help of the type of work. They are successful with the help of crowdsourced work. Because it saves time. So the answer is Crowdsourcing.
3 0
3 years ago
Which programming languages is best for game development? ​
kvasek [131]

Answer:

JavaScript. .

HTML 5.

SQL.

Python. .

Explanation:

hold it helps◕‿◕

3 0
3 years ago
What is the minimum number of bits you need to encode the 26 letters of the alphabet plus a space?Pace?
Andrei [34K]

Answer

5 bits

Explanation

A bit is the least or the smallest unit of data in a computer. They are  the units of information in information theory, consisting of the amount of information required to specify one of two alternatives 0 and 1. This is because A bit has a single binary value, either 0 or 1

If you use roman alphabet A to Z lets use log 2(26)=4.7 bits. when you round off it will be 5 bits.

8 0
4 years ago
Other questions:
  • When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
    15·1 answer
  • For wired network cards that get their IP addresses through DHCP, what can be set manually?
    5·1 answer
  • i will be doing an interview to someone so plz comment down below something random and you will automatically enter
    11·1 answer
  • A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all
    9·1 answer
  • Accepting criticism is a trait of what people?
    5·1 answer
  • When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer wi
    7·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • Describe risk avoidance. Name three common methods of risk avoidance.
    5·1 answer
  • How to connect two routers wirelessly to extend range.
    15·1 answer
  • _____ allows a function or operator to perform different tasks depending on the types of the arguments or operands. Group of ans
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!