1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
3 years ago
5

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

Computers and Technology
1 answer:
Margaret [11]3 years ago
3 0

Answer:

/28 -- 16 Subnets -- 14 Hosts/Subnet

14*16 = 224 hosts

Explanation:

see https://www.aelius.com/njh/subnet_sheet.html

You might be interested in
How many instructions can the microprocessor execute each second if the assembly line is present?
SpyIntel [72]

The instructions that he microprocessor can execute each second if the assembly line is present will be depending on the workload and the architecture’s core because it is all depending on the speed of the CPU and the multiplier that it acquires.

3 0
3 years ago
What does DOS stand for?
anygoal [31]

Answer:

Disk Operating System

Explanation:

"DOS is a platform-independent acronym for Disk Operating System which later became a common shorthand for disk-based operating systems on IBM PC compatibles."

5 0
3 years ago
My laptop is 20℅ charged and then i shut down it . I dont turned it on for 2 days and also donot charge it now after 2 days it i
Tju [1.3M]

Answer:

__you need to charge it__

4 0
3 years ago
What are two things that happen when a home computer scanner uses electromagnetic waves?
Genrish500 [490]

Answer: C hope this helped :)

Explanation:

3 0
3 years ago
Read 2 more answers
The short-range two-way communication technology behind contactless payments is called ____.
iogann1982 [59]

Answer:The answer is near field communication.

Explanation:

8 0
1 year ago
Other questions:
  • You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
    13·1 answer
  • What precaution can you take while using a social networking site to prevent a data breach?
    15·1 answer
  • When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
    15·1 answer
  • What do you think about the use the top song on a video you are creating
    8·2 answers
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • Describe how one can change row and height
    6·1 answer
  • To insert a new slide, which tab option should you select?
    12·2 answers
  • Please help me i’ll give you brainlist
    13·1 answer
  • Input two numbers and print their sum products difference division and remainder​
    9·1 answer
  • At a commercial quick charge station, a fully depleted 87 kwh battery in 2023 ariya can be charged from 20% to 80% in about ____
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!