1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
12

You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25

5.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248
Computers and Technology
1 answer:
iren [92.7K]3 years ago
3 0

Answer:

B. 255.255.255.224

Explanation:

Subnetting in networking is a process of reducing the number of wasted IP addresses used in a network. There are three major classes of IP address, they are, Class A, B, and C with respective network addresses of 1,2, and 3 octets of the subnet mask.

255.255.255.0 is a class C IP address, it only has one subnet mask and 256 host address. In a network of 16 to 30 hosts, 226 to 240 addresses would be wasted. Subnetting the address to have five subnets reduces the IP addresses used.

The new subnet mask becomes 255.255.255.224 borrowing 3 bits from the fourth octet to give 8 subnet masks and 30 host IP addresses.

You might be interested in
Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her compu
o-na [289]

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

5 0
3 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
I need help!!! i will make you a brainliest!!
Ber [7]

Answer:

What you have is correct

Explanation:

3 0
3 years ago
Write the name of the tab, command group, and icon you need to use to access the borders and shading dialog box.
Ilia_Sergeevich [38]

Answer:

Tab: Home Tab

Command group: Paragraph

Icon: Triangle

Explanation:

7 0
3 years ago
Which of the following controls computer memory?
Bogdan [553]
Operation system (OS)
4 0
3 years ago
Other questions:
  • The linux and macos program traceroute is known by a slightly different name on windows. it's referred to as ______.
    5·1 answer
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: the name of the clie
    7·1 answer
  • Fix the 2 error codes.
    14·1 answer
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are
    9·2 answers
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    9·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
    14·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    10·2 answers
  • Type of file containing instructions that tell your computer how to perform ___
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!