1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
14

Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the

new LAN. You’ve determined that you need 50 subnets for the Class B network beginning with the network ID 172.20.0.0. How many host bits will you need to use for network information in the new subnets?
Computers and Technology
1 answer:
astraxan [27]3 years ago
3 0

Answer:

Check the explanation

Explanation:

• We are taking a look at the class B network beginning with 172.0.0.0.0,while Converting this value to binary as:10101100.00010100.00000000.00000000.  32 bits in total, out of this the First 16 bits that are used as network ID and the subsequent 16 bits are used as HostID.Out of the 16 bits that are sued for Network ID the 2 bits namely Bits fifteen and sixteen (15 and 16) have been set and can't be changed and hence only 14 bits are used as network ID.

• Now so that we can divide this network into 50 subnets for class B network we will have to borrow a bit as shown below:

• 10101100.00010100.00000000.00000000=172.0.0.0.0,Adding 1 bit by borrowing from host portion and adding it to network ID will give it 10101100.00010100.00000000.00000000(0 shown in bold) or10101100.00010100.10000000.00000000 (1 shown in bold) will give us 2 unique subnets.i.e changing 1 bit will give us 2 power 1=2 subnets,thus changing 2 bits will give us 2 power 2 subnets =4 similarly changing 6 bits will give us 64 unique subnets.

• Which means and going by the above problem statement in case we need 50 subnets and we also need to change 6 bits in the Network ID to give 50 unique subnets.

• Thus the answer is 6

You might be interested in
A __________ is the blueprint for __________ having similar attributes and behaviors. signature, objects class, parameters heade
MrRa [10]

Answer: E. class, objects

Explanation:

<em>A </em><em><u>class</u></em><em> is the blueprint for </em><em><u>objects</u></em><em> having similar attributes.</em>

As much as classifying something means to define it based on the characteristics that is has that are similar to other things in that class, so also is a class here.

A class is the blueprint or rather template for making objects that have similar attributes which means that the class therefore gives the object its various attributes and its behavior.

4 0
2 years ago
Read the scenarios below, then use the drop-down menus to decide if you should use a database.
Romashka [77]

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

5 0
3 years ago
Which of the following can be used to get an integer value from the keyboard?
seraphim [82]

Answer:

Integer.parseInt( stringVariable );

Explanation:

This function is used to convert the string into integer in java .Following are the program that convert the string into integer in java .

public class Main

{

public static void main(String[] args)  // main method

{

 String num = "1056"; // string variable

int res = Integer.parseInt(num);  //convert into integer  

System.out.println(res); // display result

}

}

Output:1056

Therefore the correct answer is:Integer.parseInt( stringVariable );

6 0
3 years ago
Describe what each of the following functions in R do.1. t2. matplot3. c4. seq5. legend6. matrix7. rownames8. colnames9. type of
slega [8]

Answer:

1. t is a function used to transpose a matrix object. The object is passed as an argument to the function.

2. matplot is a graphical function in R used for data visualization.

3. The c function is used to combine arguments.

4. seq is an R function used to derive a range of numbers, optionally specifying a start, stop and step argument or simply a single numeric argument.

5. legends are used in data visualization to list and define items in the graphical presentation.

6. matrix is a function in R used to create and work with matrix and data frame objects.

7. rownames and colnames are functions used to label the row and columns of a data frame in R.

8. The typeof function return the data type of an object.

Explanation:

The R programming language is a dedicated programming language for data analysis and visualization.

5 0
3 years ago
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
galben [10]

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

5 0
3 years ago
Other questions:
  • What does raster graphic mean
    5·1 answer
  • How to use javascript libraries in javascript code?
    9·1 answer
  • In several languages, the visual development environment is known by the acronym ____.
    12·1 answer
  • If johnny has 800 socks and john has 1000 more how much does john have
    9·1 answer
  • Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
    13·1 answer
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • Identify the following​
    9·1 answer
  • After reading his e-mail messages, Orlando became very frustrated. Many of the messages he received did not conform to netiquett
    6·1 answer
  • Which part of the computer is responsible for managing memory allocation for all applications
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!