1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
14

Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the

new LAN. You’ve determined that you need 50 subnets for the Class B network beginning with the network ID 172.20.0.0. How many host bits will you need to use for network information in the new subnets?
Computers and Technology
1 answer:
astraxan [27]3 years ago
3 0

Answer:

Check the explanation

Explanation:

• We are taking a look at the class B network beginning with 172.0.0.0.0,while Converting this value to binary as:10101100.00010100.00000000.00000000.  32 bits in total, out of this the First 16 bits that are used as network ID and the subsequent 16 bits are used as HostID.Out of the 16 bits that are sued for Network ID the 2 bits namely Bits fifteen and sixteen (15 and 16) have been set and can't be changed and hence only 14 bits are used as network ID.

• Now so that we can divide this network into 50 subnets for class B network we will have to borrow a bit as shown below:

• 10101100.00010100.00000000.00000000=172.0.0.0.0,Adding 1 bit by borrowing from host portion and adding it to network ID will give it 10101100.00010100.00000000.00000000(0 shown in bold) or10101100.00010100.10000000.00000000 (1 shown in bold) will give us 2 unique subnets.i.e changing 1 bit will give us 2 power 1=2 subnets,thus changing 2 bits will give us 2 power 2 subnets =4 similarly changing 6 bits will give us 64 unique subnets.

• Which means and going by the above problem statement in case we need 50 subnets and we also need to change 6 bits in the Network ID to give 50 unique subnets.

• Thus the answer is 6

You might be interested in
To extract detailed and comprehensive responses from your client, use the _____ questioning technique.
liubo4ka [24]

Answer:

I think it’s open ended question technique

Explanation:

but I would definitely change it if’s it wrong and I’m also sorry if it is

4 0
2 years ago
Read 2 more answers
Ancestor(X,father(X)) and ancestor(david,george) is they unify or not
Tanya [424]
This is not a computer and technology question but ill still answer it!! They are not
6 0
3 years ago
When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
exis [7]

The available options are:

Emails

Financial spreadsheets

User downloads

Databases

Answer:

User downloads

Explanation:

The correct answer is User downloads, this is because, the downloaded files are in cloud or another website memory or database, which serves as an alternative backup already. Thus, those downloaded files can still be recovered at later time when one needs to get the files back.

However, Emails, Financial spreadsheets and Databases, do not have any other place to retrieve them, because they are originally created and are yet to be uploaded to cloud or another website memory space to serves as alternative back up.

4 0
4 years ago
Erewrxdnnefwn q wedsvd
Alexus [3.1K]

Answer:

hahahahahhahahahahhaha

6 0
3 years ago
What are the design concepts and assumptions behind a class, an object and the relationship between them? What are the roles met
Triss [41]

Answer:

Object-oriented programming (OOP) is a procedural language and based on classes associated with an object. Without classes and object relationship OOP is not possible. According to program's design concept classes provide abstraction and encapsulation with the help of object. Object have states and behaviors like cat has states like name, color and  cat has also behaviors like  wagging the tail, eating, jumping etc. A class forms template or blueprints for these states and behaviors because different cats have different behaviors and states.

Methods provide a way for encapsulation and accessing private class members with public methods and static fields are sometimes best alternative for global variable. We can use static field when it same for all and shared by all objects of that class and it can save memory because we do not have to initialize it for each object

8 0
3 years ago
Other questions:
  • What is the type of account and normal balance of allowance for uncollectible accounts?
    13·2 answers
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • If you delete a sent message on gmail does the person still get it
    14·1 answer
  • A major difference between digital librarians and traditional librarians is that traditional librarians rarely work with people.
    15·2 answers
  • What is a central location that houses Joint Information System (JIS) operations and where public information staff perform publ
    6·1 answer
  • What are the four types of technical drawing?​
    9·1 answer
  • What is the FTC used car rule
    12·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • What values can represent a bit
    8·1 answer
  • Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!