1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
6

Can you subnet the 172.16.128.0/17 network address to support this subnet?

Computers and Technology
1 answer:
MrRa [10]3 years ago
8 0
<span>Address: 172.16.128.0 10101100.00010000.1 0000000.00000000
Netmask: 255.255.128.0 = 17 11111111.11111111.1 0000000.00000000
Wildcard: 0.0.127.255 00000000.00000000.0 1111111.11111111
=> Network: 172.16.128.0/17 10101100.00010000.1 0000000.00000000 (<span>Class B)
Broadcast: 172.16.255.255 10101100.00010000.1 1111111.11111111
HostMin: 172.16.128.1 10101100.00010000.1 0000000.00000001
HostMax: 172.16.255.254 10101100.00010000.1 1111111.11111110
Hosts/Net: 32766 (Private Internet)
</span></span>
You might be interested in
What is Service Operations in ITIL​
Nostrana [21]

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

7 0
4 years ago
Supermarket managers who use scanners on the checkout counters to track inventory levels of their products are using a(n) ______
lidiya [134]
Operation Information System, because you are only collecting data on the amount of products leaving the store.
6 0
4 years ago
Which of the following is the most common tool that Windows administrators use on the domain controller?
baherus [9]

Answer:

D. The Active Directory Users and Computers

Explanation:

The Active Directory Users and Computers (ADUC) is one of the many tools used to administer the Active Directory and it is the most common tool that Windows admins use on the domain controller. It provides most of the admins functions such as

i. resetting of password

ii. unlocking users

iii. delegating of permissions to users to manage group policy

iv. managing Active Directory objects - users, computers, contacts, groups - and their attributes.

Other tools are Active Directory Component Services (allows to manage component services), Active Directory Domains and Trusts (allows to manage trusts between forests and domains), Active Directory Administrative Center (allows to manage password policies and even get the history of PowerShell logs).

<em>Hope this helps!</em>

3 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Choose the word that best completes this sentence. Caught-in and caught-between injuries result from a person being squeezed, ca
loris [4]
I do not know, i really hope you dont fail!!!!!!!!!
8 0
3 years ago
Read 2 more answers
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • The equation y=2x+1 represents a function true or false
    11·1 answer
  • Activities that scan network locales for active systems and then identify the network services offered by the host systems is kn
    12·1 answer
  • What can you say about the following Java class definition?
    10·1 answer
  • Which spreadsheet operation does a look function perform?
    5·1 answer
  • At some point in your driving career, you will most likely be faced with an oncoming vehicle swerving into your travel lane. tru
    6·1 answer
  • The at command is used to _______________.
    15·1 answer
  • This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking n
    12·1 answer
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • Which database can be used to find studies related to allied health sciences?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!