1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
11

how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address

Computers and Technology
1 answer:
jonny [76]3 years ago
3 0

Answer:

The answer is "14".

Explanation:

Let the IP address = 196.45.204.0

When it borrowed 4 bits

\therefore\\\\ subnet = 28

IP=  \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000

If the borrowed bits are left out then:

The Number of useable host addresses:

= {(2^4) - 2} \\\\ = 16-2\\\\ =14

You might be interested in
Please help me, I'll give you 15 points.
babunello [35]
Yep same, i don’t know what to write abt it is jus saying what to write and now what abt
4 0
3 years ago
A 32-bit computer has two selector channels and one multiplexor channel. Each selector channel supports two hard disks and two D
Anit [1.1K]

Answer:

Maximum Aggregate I/O Transfer Rate = 1630kb/s

Explanation:

Given

Transfer rate of

Disk Drive = 800Kb/s

DVD Drive = 700Kb/s

Printer = 10Kb/s

VDT = 2Kb/s

Units

DVD = 2

Hard Disk = 2

Printers = 2

VDT Channels = 5

Only one device at a time can be serviced on a selector channel

Both cannot be active at a time

So, the device with higher transfer rate will be granted access (Disk Drive, 800Kb/s)

Maximum aggregate I/O transfer rate in this system is calculated by:

Summation of transfer rate of each device

= 800 * 2 + 2 * 10 + 5 * 2

= 1600 + 20 + 10

= 1630kb/s

7 0
3 years ago
Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
amid [387]

Answer:

WHITE HACKERS

Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.

4 0
3 years ago
Read 2 more answers
The data I collect in Google Forms are all compiled in a spreadsheet for me.<br> False <br> True
Mandarinka [93]
I think it's false. If I'm wrong then sorry.
5 0
4 years ago
Read 2 more answers
An example of what you can post that shows kindness to other
harina [27]

Answer:

everybody is awesome

Explanation:

5 0
3 years ago
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • Software used the control a computer's hardware
    14·1 answer
  • What is looping in QBASIC​
    9·1 answer
  • you are researching the Holocaust for a school paper and have located several Web sites for information. In a paragraph of no le
    7·1 answer
  • Select all that apply
    14·1 answer
  • In the Mouse Properties window, you can?
    8·1 answer
  • Which statement describes part of the meeting scheduling process? It is always an all-day event. It is created in a single calen
    14·1 answer
  • Provide instance fields for title, month, and year (for example, "Scientific American", "April", 2020). Each of these should be
    13·1 answer
  • 30points!!!! Plz answer quickly
    5·2 answers
  • 4. What is the package name in which the Scanner class resides?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!