1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
12

You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25

5.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248
Computers and Technology
1 answer:
iren [92.7K]3 years ago
3 0

Answer:

B. 255.255.255.224

Explanation:

Subnetting in networking is a process of reducing the number of wasted IP addresses used in a network. There are three major classes of IP address, they are, Class A, B, and C with respective network addresses of 1,2, and 3 octets of the subnet mask.

255.255.255.0 is a class C IP address, it only has one subnet mask and 256 host address. In a network of 16 to 30 hosts, 226 to 240 addresses would be wasted. Subnetting the address to have five subnets reduces the IP addresses used.

The new subnet mask becomes 255.255.255.224 borrowing 3 bits from the fourth octet to give 8 subnet masks and 30 host IP addresses.

You might be interested in
Why is the Vigenere cipher hard to crack? (select 2)
Nata [24]
The Vigenere cipher is hard to crack because each letter in a message could be encoded as any of the 26 letters in the alphabet
8 0
3 years ago
Please answer these questions! Will mark Brainliest!!
Sergio039 [100]

Answer:

1) bob behnken and doug hurley

2)yes

3) august

7 0
3 years ago
Dawn is trying to find out how much weight she can push across the room. She is really trying to find her __________. A. flexibi
Marrrta [24]

<em>The correct answer is d. muscular strength.</em>

<em></em>

<em>Explanation :</em>

<em></em>

<em>The maximal force a muscle can create when it contracts is referred to as muscular strength. When compared to someone with lower physical strength, someone with better muscular strength can lift heavier weights. Lifting progressively larger weights over time and eating a diet rich in protein-based foods can help a person's physical strength gradually grow.</em>

<em></em>

<em>I hope this helps. Please mark "Brainliest" if you can.</em>

8 0
3 years ago
One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be
valentina_108 [34]

Answer:

Kanban System

Explanation:

Kanban can be regarded as one of Lean tools which is been designed to carry out reduction of the idle time in a production process. The idea or concept behind this Kanban system, is to make delivery of needs of the process needs at exactly the it needs it. Kanban can be reffered to as visual cards. Kanban can as well be explained as scheduling system that is used for lean manufacturing as well as just-in-time manufacturing. Taiichi Ohno, who was an industrial engineer at Toyota carried out development of kanban so that there could be an improved manufacturing efficiency. Kanban is considered as one method used to achieve JIT.

It should be noted that Kanban System is One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be initiated .

7 0
3 years ago
What data unit is encapsulated inside a packet?<br> frame<br> datagram<br> segment<br> session
AVprozaik [17]
The answer is frame
8 0
4 years ago
Read 2 more answers
Other questions:
  • Assume that x is a double variable that has been initialized. Write a statement that prints it out, guaranteed to have a decimal
    5·1 answer
  • __________________ fonts use binary code to define each pixel of the letter to be displayed.
    8·1 answer
  • Do you think technology and social media have made it easier or more difficult to make connections and find a job? Explain.
    12·1 answer
  • State The function<br>of floppy disk​
    10·1 answer
  • Janis is preparing a financial document. She needs to use the dollar symbol placed above the number key 4. Which key will Janis
    14·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • What two benefits are a result of configuring a wireless mesh network? Check all that apply.
    12·1 answer
  • Which of the following does NOT describe the characteristics of cyberbullying?
    15·2 answers
  • Connection security rules are used to secure traffic between two computers while it crosses internet?
    7·1 answer
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!