1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
7

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste

the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)
A. 10.18.10.200/28
B. 10.18.10.208/28
C. 10.18.10.224/28
D. 10.18.10.200/27
E. 10.18.10.224/27
Computers and Technology
1 answer:
ololo11 [35]3 years ago
4 0

As result as follows these two network addresses can be assigned to the network containing 10 hosts:

B. 10.18.10.208/28

C. 10.18.10.224/28

<u>Explanation:</u>

Since 10.18.10.0/24 depends on subnet also.  10.18.10.0 To 10.18.10.63 is taken to leftmost network address. Since it is 4 host bits, it required to accommodate 10 hosts.  And it marks to be in end with /28.

And more over 10.18.10.200/28 should be invalid network number. Moreover other one ends with /27 it is invalid to this specific ranges of tcpip address.

Other 10.18.10.200/27 or 10.18.10.224/27 is falls in invalid range, because it ends with /27

You might be interested in
What does ip mean? internet protocol address internet program internet process (system software) internet prescience?
Mashutka [201]
Ip means internet protocol address
7 0
3 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
Bugs bunny personality traits
Dafna1 [17]

Answer:

As a character, Bugs Bunny is king, and he's as close to an animated culture hero as we're going to get. Think about it. He's the person you want to be — the smartest one in the room who's still effortlessly cool. He's quick-witted, funny, and even a little cruel, but only to his tormenters.

Explanation:I hope this helps!!!Plz leave a heart and a rating!!

3 0
4 years ago
Type the correct answer in the box. Spell all words correctly.
scoundrel [369]

Answer:

Patsy is possibly using a cable television system.

Explanation:

The cable television system is the private television service provision system that is provided not through signals captured by means of antennas, but through coaxial cables that are connected from the home to the poles belonging to the providers, located on the public road.

The advantages of wired televission are relatively high sound and image quality with a minimum of interference with the simplicity and low cost of subscriber receivers.

5 0
3 years ago
What is generation of computer ​
gladu [14]

What do you mean by generation of computer?

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading
    11·1 answer
  • Is 49 greater than y? Which below is correct?
    12·1 answer
  • The TCP/IP ____ layer, sometimes called the Internet layer, is roughly equivalent to OSI's network layer.
    7·1 answer
  • A magnetic disk drive requires a motor to position a read/write head over tracks of data on a spinning disk, (see fig. e4.4 in d
    8·1 answer
  • 6. 6. While printing a document, what are the options available in the Settings section?
    9·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30
    5·1 answer
  • I don’t understand this, i need help
    7·1 answer
  • Which statement best describes network security?
    7·1 answer
  • Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!