1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
12

You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25

5.255.192B. 255.255.255.224C. 255.255.255.240D. 255.255.255.248
Computers and Technology
1 answer:
iren [92.7K]3 years ago
3 0

Answer:

B. 255.255.255.224

Explanation:

Subnetting in networking is a process of reducing the number of wasted IP addresses used in a network. There are three major classes of IP address, they are, Class A, B, and C with respective network addresses of 1,2, and 3 octets of the subnet mask.

255.255.255.0 is a class C IP address, it only has one subnet mask and 256 host address. In a network of 16 to 30 hosts, 226 to 240 addresses would be wasted. Subnetting the address to have five subnets reduces the IP addresses used.

The new subnet mask becomes 255.255.255.224 borrowing 3 bits from the fourth octet to give 8 subnet masks and 30 host IP addresses.

You might be interested in
While working alone at their constant rates computer X can process 240 files in 4 hours, and comp Y 240 files in 8 hrs. If all f
djverab [1.8K]

Answer:

2hrs 40 min

Explanation:

3 0
3 years ago
Read 2 more answers
Darren built a tower out of 23 toy blocks. each block has a mass of 7grams. what is the mass of the whole tower?​
KIM [24]

Answer:

23 x 7 = 161

161 grams

8 0
3 years ago
Read 2 more answers
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Cloud vendors that are hosting hardware, operating system, database, and other software, which clients can then use to build the
iren2701 [21]

Answer:

a. Software as a Service.

Explanation:

These Cloud vendors are said to be providing Software as a Service. This is because regardless of that the underlying specs are in regards to hardware, operating systems, database, etc. The vendor is selling a subscription to their cloud software which bundles all of these services together. Therefore, what they are ultimately providing is a Software that the individual can use as a service, and enjoy all of the included benefits/capabilities.

8 0
3 years ago
How many conditions are needed in a while loop that should run until a user guesses the correct number or until they have made f
Sonja [21]
<h2>[] Hello! []</h2>

Answer:

2

Explanation:

MS Coding 1 A ED

---------------------------------------------------------------------------------------

  • I hope this helped
  • Brainilest appreciated!
7 0
3 years ago
Other questions:
  • What is the biggest disadvantage of copying a worksheet into another workbook?
    13·1 answer
  • 25. Becca is learning how to brush her teeth independently and her therapist/RBT has created an activity schedule to help teach
    6·1 answer
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • How would you reduce or minimize the size of a "file"?
    5·1 answer
  • A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a lat
    9·2 answers
  • Based on the following quote from Leonardo Da Vinci, what would be his definition of a fine artist? “Principles for the Developm
    11·2 answers
  • Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number
    7·1 answer
  • Which TWO of the following are input devices that are parts of a laptop computer?
    9·2 answers
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!