1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
9

You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets. How many hosts per network, and total networks do you get

once subnetted.

Computers and Technology
1 answer:
lora16 [44]3 years ago
7 0

Answer:

Hosts per network = 2

Total networks once subnetted = 64

Explanation:

You might be interested in
What type of activities are performed with the help of the software used in hospitals?
faust18 [17]

Answer:

Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.

7 0
3 years ago
Read 2 more answers
Write a report on the effectiveness of using thicker bags. Remember to include the effect on the environment and the economy in
malfutka [58]

The effectiveness of using thicker bags are:

  • It has the lowest environmental impact in terms of any other disposable bag.
  • It can be used three to six more times.
  • It is environmentally sustainable.

<h3>What is the effect of thicker plastic bags have on the environment?</h3>

The use of plastic bags is known to have some form of detrimental effects on the such as animal choking, pollution, and others.

Conclusively, Note that thicker bags needs a lot of plastic to be able to produce it and it goes to waste even if a person do not use it again.

Learn more about environment from

brainly.com/question/17413226

4 0
2 years ago
When designing a slide for presentation, it is best to include as much information as possible on every slide. True Or False
Mariulka [41]

Answer:

false

Explanation:

try to limit the amount of info on each slide

4 0
3 years ago
Read 2 more answers
The fourth generation of computers was marked by the introduction of ____.
Mila [183]
<span>The fourth generation of computers was marked by the introduction of microprocessors. </span>
6 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
3 years ago
Other questions:
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • What are the five types of alignment in Word?
    12·2 answers
  • In the Unified Process (UP), related activities are grouped into UP ____. a. Services b. Disciplines c. Cycles d. Practices
    11·1 answer
  • The signature of a function is determined by
    5·1 answer
  • True or false?
    15·2 answers
  • My brainly is no hello friend , i need you can you help me, please okay
    13·2 answers
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Two strategies for keeping your files in sync
    6·1 answer
  • 1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!