1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
4 years ago
10

A CIDR block contains the following subnets with the IP addresses of 192.168.68.0/22 192.168.69.0/22 192.168.70.0/22 192.168.71.

0/22
Are there any problems with this group of subnets in the CIDR block?

Why?

Be specific Which subnet(s) are the given addresses in?
Computers and Technology
1 answer:
Dafna1 [17]4 years ago
4 0

Answer:

Yes there is a problem.

Explanation:

Yes there is a problem.

Looking at /22, the host part has 10 bits(right most 10 bits). The subnet mask is:

1111111.11111111.11111100.00000000

The first IP address which is 192.168.68.0 in binary form:

11000000.10101000.1000100.00000000

Here all the 10 bits of host part are 0's. Hence it is a valid network IP address.

192.168,68.0 - This is avalid subnet id

The Next IP address 192.168.69.0 in binary form:

11000000.10101000.1000101.00000000

Here all the 10 bits of host part are not 0's. Hence it is not a valid network IP address for /22 cidr.

Moreover this address lies in the first subnet - 192.168.68.0, which has host addresses in the range of 192.168.68.1 to 192.168.71.254

Hence other IP addresses 192.168.69.9/22, 192.168.70.0/22 and 192.168.71.0/22 lies n the subnet 192.168.68.0/22.

You might be interested in
Which of the following is not true about a computer byte? A) It is made up of 8 bits. B) Each letter of the alphabet is stored i
sergey [27]

Answer:

C) It can either be a 1 or a 0.

Explanation:

Computer byte is a collection of eight bits of data. Computers are electronic or digital devices that communicats usinv bits of data. The bits can be converted to byte and kilobytes, megabytes etc, to promote the speed of communication between the components of digital devices. A each bit position of a byte represents a decimal value. A byte combination can represent a word, number or a special character.

8 0
3 years ago
A page-ranking algorithm ranks web pages according to
damaskus [11]

Answer:

c. the number of other web pages that link to them

Explanation:

Ranking of the website on google depends on many factors, such as content of the website, keywords, No. of users visiting the website and also the links that may internal and external links found on the website.

The external links on the website increase the credibility of the website. As the number of external links increases on the website, it looks more credible to the search engine. The search will assign good ranks if the website looks credible.

<em>Page Rank algorithm is used to count the number of external links of the website to rank the website on Google. As much as the No. of links are on website, the website ranks high.</em>

4 0
3 years ago
Read 2 more answers
The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standa
Evgesh-ka [11]

Answer:

True

Explanation:

The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standards for communication and other technologies. Known officially as IEEE 802.11n (or wireless-N) is the newest standard for wireless networking. Compared with earlier standards like 802.11b, wireless-N offers faster speeds, more flexibility, and greater range.

6 0
3 years ago
Read 2 more answers
Fair use laws allow you to use other people’s copyrighted information in which of the following purposes? A: For profit Purposes
andrew-mc [135]
Fair use laws allow you to use other peoples copyrighted info for educational purposes
3 0
4 years ago
Read 2 more answers
What are the three benefits of incremental development, compared to the waterfall<br> model?
taurus [48]

Answer:

The cost of accommodating changing customer requirements is reduced

3 0
3 years ago
Other questions:
  • The order in which statements are executed during a program run. Answer 1 The first part of a compound statement begins with a k
    12·1 answer
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • Rather than a single address, you can refer to an array using their first (top/Left) and last (bottom/right) addresses separated
    15·1 answer
  • 2 inventions revolutionized photography, what are they?
    10·1 answer
  • In the transactional process model of communication, the meaning of a message resides with the ___________.
    6·1 answer
  • Omar is preparing to deliver a presentation to his class. It is about a program to collect samples from an asteroid that has bee
    13·1 answer
  • Fill in the blanks of the SQL Statements: Fund_Id VARCHAR(10) , Donor_id VARCHAR(10) , Count_Of_Receipts INTEGER, Total_Receipts
    15·1 answer
  • Can anyone give me $2 (Reddem code/Promo Code)​
    15·2 answers
  • Savings accounts _____.
    15·1 answer
  • Select the correct answer.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!