1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
3 years ago
13

3. An organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that ex

ist per subnet will be 25. What subnet mask would you use to solve the problem?
Computers and Technology
1 answer:
lesya [120]3 years ago
3 0

Answer:

The correct answer is: 255.255.255.192.

Explanation:

A subnet mask complements an Internet Protocol (IP). Thanks to subnet masks IP addresses can be identified because they seem to be all the same but the subnet mask avoids confusion. If four subnets are to be created for the IP 192.168.90.0 3 bits of that IP must be used to create the subnet resulting in 255.255.255.192. Then:

  • <em>Number of subnets</em>: 2^{3} - 2 = 6
  • <em>Number of hosts per subnet</em> = 2^{5} -2  = 30
You might be interested in
A table cell contains _______ piece(s) of data.
Karolina [17]
A table cell contains one piece of data
3 0
3 years ago
The internet protocol uses unique addresses, simply called ____ addresses, to identify computers or devices in a network.
Nezavi [6.7K]
IP Address, that is a unique address used to identify devices in a network
3 0
3 years ago
Please help! <br>Which team member on a project typically understands color theory and graphic art?​
lianna [129]

Answer:

You want the name of the member/what he or she is called?

4 0
2 years ago
How useful do you find the creation of folders in your computer? Explain why.
kykrilka [37]
I find the creation of folders to be very helpful as if i didn't have folder there would br no order in my file management
8 0
3 years ago
Read 2 more answers
What are some of the other operations that might be implemented for a stack?
melomori [17]

Answer:

push, pop, top, clear

Explanation:

push: add a new value

pop: remove and return top value

top: return top value without removing

clear: remove all values

6 0
3 years ago
Other questions:
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • Who was the first person in 1983 to offer a definition of the term computer virus
    11·2 answers
  • Which is a function of network media?
    11·2 answers
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • Which business case is better solved by Artificial intelligence than conventional programming?<br>​
    8·1 answer
  • The blue section of the following Venn diagram could represent which of the following Boolean statements?
    14·1 answer
  • True or False The two types of general construction projects are residential for homes or dwellings and commercial for a commerc
    7·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • List the steps to look it install and then run a program or mobile app
    8·1 answer
  • Write a program to input a number.Find the sum of digits and number of digits
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!