1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
14

Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the

new LAN. You’ve determined that you need 50 subnets for the Class B network beginning with the network ID 172.20.0.0. How many host bits will you need to use for network information in the new subnets?
Computers and Technology
1 answer:
astraxan [27]3 years ago
3 0

Answer:

Check the explanation

Explanation:

• We are taking a look at the class B network beginning with 172.0.0.0.0,while Converting this value to binary as:10101100.00010100.00000000.00000000.  32 bits in total, out of this the First 16 bits that are used as network ID and the subsequent 16 bits are used as HostID.Out of the 16 bits that are sued for Network ID the 2 bits namely Bits fifteen and sixteen (15 and 16) have been set and can't be changed and hence only 14 bits are used as network ID.

• Now so that we can divide this network into 50 subnets for class B network we will have to borrow a bit as shown below:

• 10101100.00010100.00000000.00000000=172.0.0.0.0,Adding 1 bit by borrowing from host portion and adding it to network ID will give it 10101100.00010100.00000000.00000000(0 shown in bold) or10101100.00010100.10000000.00000000 (1 shown in bold) will give us 2 unique subnets.i.e changing 1 bit will give us 2 power 1=2 subnets,thus changing 2 bits will give us 2 power 2 subnets =4 similarly changing 6 bits will give us 64 unique subnets.

• Which means and going by the above problem statement in case we need 50 subnets and we also need to change 6 bits in the Network ID to give 50 unique subnets.

• Thus the answer is 6

You might be interested in
What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
marishachu [46]

CoBIT Information Systems Audit and Control Association is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting

A. CoBIT Information Systems Audit and Control Association

<u>Explanation:</u>

The key factor for evaluating the internal controls is CoBIT information technology ion are the best reporting tools. Where an organization can generate reports and do the analysis and take the right decision.

Since it has various departments t inside the organization some time performance of the department depends on another department.

The SWOT analysis can be achieved and management can give some input process to improve the department or individual performance in the departments the organization also need an audit log trail to improve internals in the organization.

5 0
3 years ago
Classify computer based on signal
Karolina [17]

Answer:

Computers use analog and digital signals in order to process raw data into useful information. Whereas the former is fast at processing results, the latter gives the most accurate information. Somewhere in between is hybrid processing, which is meant to combine the advantages of the aforementioned technologies.

3 0
2 years ago
Which statement refers to a computer software
bija089 [108]

You need to see an image, but here's some possible answers.

operating system.

program.

spreadsheet.

freeware.

groupware.

shareware.

application software.

bundled software.

software system. ...

package. ...

sofware (related) ...

hardware (related) ...

software program. ...

software-hardware (related) ...

pc-based (related)

<h2><u><em>Bryannasalaz</em></u></h2>

4 0
2 years ago
Sue conducted an experiment to determine which paper towel is the most absorbent among three different brands. She decides to pr
Triss [41]

Answer:

Its C

Explanation:

On Edg

7 0
3 years ago
Interest accumulated on the principle of a loan must also be paid. The accumulated interest is known as which of the following?
tangare [24]
I think B but idk lol
7 0
3 years ago
Other questions:
  • Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
    11·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • We already know that we can create a lunar lander application of the pipe-and-filter architecture style from three independent J
    6·1 answer
  • The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:
    13·2 answers
  • Describe how a web browser and web server work together to send a web page to a user
    8·1 answer
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem usi
    14·1 answer
  • Tommy loves taking care of homing pigeons. He sent a note to his crush who lives 24.0 km away from his house. These birds fly at
    9·1 answer
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!